메뉴 건너뛰기




Volumn 21, Issue 1, 2013, Pages 137-146

A novel tamper detection scheme for BTC-compressed images

Author keywords

block truncation coding; image authentication; tamper detection

Indexed keywords

AUTHENTICATION; IMAGE COMPRESSION; RANDOM NUMBER GENERATION;

EID: 84871946125     PISSN: 12303402     EISSN: 18963757     Source Type: Journal    
DOI: 10.2478/s11772-013-0078-6     Document Type: Article
Times cited : (22)

References (18)
  • 1
    • 0018515312 scopus 로고
    • Image compression using block truncation coding
    • E. J. Delp and O. R. Mitcell, "Image compression using block truncation coding", IEEE T. Commun. 27, 1335-1342 (1979).
    • (1979) IEEE T. Commun. , vol.27 , pp. 1335-1342
    • Delp, E.J.1    Mitcell, O.R.2
  • 2
    • 0021515479 scopus 로고
    • Absolute moment block truncation coding and its application to colour image
    • M. D. Lema and O. R. Mitchell, "Absolute moment block truncation coding and its application to colour image", IEEE T. Commun. 32, 1148-1157 (1984).
    • (1984) IEEE T. Commun. , vol.32 , pp. 1148-1157
    • Lema, M.D.1    Mitchell, O.R.2
  • 3
    • 54549096836 scopus 로고    scopus 로고
    • Colour image coding scheme using absolute moment block truncation coding and block prediction technique
    • Y. C. Hu, B. H. Su, and P. Y. Tsai, "Colour image coding scheme using absolute moment block truncation coding and block prediction technique", Imaging Sci. J. 56, 254-270 (2008).
    • (2008) Imaging Sci. J. , vol.56 , pp. 254-270
    • Hu, Y.C.1    Su, B.H.2    Tsai, P.Y.3
  • 4
    • 79954600061 scopus 로고    scopus 로고
    • A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation
    • Y. Yang, Q. Chen, and Y. Wan, "A fast near-optimum block truncation coding method using a truncated K-means algorithm and inter-block correlation", AEUE - Int. J. Electron. Commun. 65, 576-581 (2011).
    • (2011) AEUE - Int. J. Electron. Commun. , vol.65 , pp. 576-581
    • Yang, Y.1    Chen, Q.2    Wan, Y.3
  • 5
    • 84862798535 scopus 로고    scopus 로고
    • An improved vector quantization scheme for grayscale image compression
    • Y. C. Hu, W. L. Chen, C. C. Lo, and J. C. Chung, "An improved vector quantization scheme for grayscale image compression", Opto-Electron. Rev. 20, 187-193 (2012).
    • (2012) Opto-Electron. Rev. , vol.20 , pp. 187-193
    • Hu, Y.C.1    Chen, W.L.2    Lo, C.C.3    Chung, J.C.4
  • 6
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • F. Bartolini, A. Tefas, M. Bami, and I. Pitas, "Image authentication techniques for surveillance applications", Proc. IEEE89, 1403-418 (2001).
    • (2001) Proc. IEEE , vol.89 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Bami, M.3    Pitas, I.4
  • 7
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication", IEEE T. Consum. Electr. 46, 31-39 (2000).
    • (2000) IEEE T. Consum. Electr. , vol.46 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 8
    • 0035362493 scopus 로고    scopus 로고
    • Approximate image message authentication codes
    • L. Xie, G. R. Arce and R. F. Graveman, "Approximate image message authentication codes", IEEE T. Multimedia3, 242-252 (2001).
    • (2001) IEEE T. Multimedia , vol.3 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graveman, R.F.3
  • 9
    • 27844494781 scopus 로고    scopus 로고
    • A novel image authentication scheme based on quadtree segmentation
    • P. Y. Tsai, Y. C. Hu, and C. C. Chang, "A novel image authentication scheme based on quadtree segmentation", Imaging Sci. J. 53, 149-162 (2005).
    • (2005) Imaging Sci. J. , vol.53 , pp. 149-162
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 10
    • 65649138758 scopus 로고    scopus 로고
    • Iterative compensation schemes for multimedia content authentication
    • S. Ababneh, R. Ansari, and A. Khokhar, "Iterative compensation schemes for multimedia content authentication", J. Vis. Commun. Image R. 20, 303-311 (2009).
    • (2009) J. Vis. Commun. Image R. , vol.20 , pp. 303-311
    • Ababneh, S.1    Ansari, R.2    Khokhar, A.3
  • 11
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguish JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation", IEEE T. Circ. Syst. Vid. 11, 153-168 (2001).
    • (2001) IEEE T. Circ. Syst. Vid. , vol.11 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 12
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification", IEEE T. Image Process. 10, 1593-1601 (2001).
    • (2001) IEEE T. Image Process. , vol.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 13
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery", Pattern Recogn. 41, 3497-3506 (2008).
    • (2008) Pattern Recogn. , vol.41 , pp. 3497-3506
    • Lee, T.Y.1    Lin, S.D.2
  • 14
    • 75249099043 scopus 로고    scopus 로고
    • A secure and robust hash-based scheme for image authentication
    • F. Ahmed and M. Y. Siyal, "A secure and robust hash-based scheme for image authentication", Signal Process. 90, 1456-1470 (2010).
    • (2010) Signal Process. , vol.90 , pp. 1456-1470
    • Ahmed, F.1    Siyal, M.Y.2
  • 15
    • 79551680643 scopus 로고    scopus 로고
    • A quantization-based semi-fragile watermarking scheme for image content authentication
    • X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication", J. Vis. Commun. Image R. 22, 187-200 (2011).
    • (2011) J. Vis. Commun. Image R. , vol.22 , pp. 187-200
    • Qi, X.1    Xin, X.2
  • 16
    • 79957706020 scopus 로고    scopus 로고
    • An adaptive image authentication scheme for vector quantization compressed image
    • J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image", J. Vis. Commun. Image R. 22, 440-449 (2011).
    • (2011) J. Vis. Commun. Image R. , vol.22 , pp. 440-449
    • Chuang, J.C.1    Hu, Y.C.2
  • 17
    • 80052535001 scopus 로고    scopus 로고
    • An image authentication method by applying Hamming code on rearranged bits
    • C. S. Chan, "An image authentication method by applying Hamming code on rearranged bits", Pattern Recogn. Lett. 32, 1679-1690 (2011).
    • (2011) Pattern Recogn. Lett. , vol.32 , pp. 1679-1690
    • Chan, C.S.1
  • 18
    • 84862827077 scopus 로고    scopus 로고
    • Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme
    • C. Li, Y. Wang, B. Ma, and Z. Zhang, "Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme", Comp. Stand. Inter. 34, 367-379 (2012).
    • (2012) Comp. Stand. Inter. , vol.34 , pp. 367-379
    • Li, C.1    Wang, Y.2    Ma, B.3    Zhang, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.