메뉴 건너뛰기




Volumn 28, Issue 5, 2013, Pages 531-552

A secure high capacity full-gray-scale-level multi-image information hiding and secret image authentication scheme via Tchebichef moments

Author keywords

Image processing; Image watermarking; Information hiding; Multi media computing; Secret communication; Secret information content verification and authentication; Steganography; Tchebichef moments

Indexed keywords

INFORMATION HIDING; MULTI-MEDIA; SECRET COMMUNICATIONS; SECRET INFORMATION; TCHEBICHEF MOMENTS;

EID: 84876903353     PISSN: 09235965     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.image.2012.12.005     Document Type: Article
Times cited : (35)

References (53)
  • 3
    • 0035330787 scopus 로고    scopus 로고
    • Digital steganography
    • D. Artz Digital steganography IEEE Internet Computing 5 3 2001 75 80
    • (2001) IEEE Internet Computing , vol.5 , Issue.3 , pp. 75-80
    • Artz, D.1
  • 6
    • 0035160549 scopus 로고    scopus 로고
    • A Survey on watermarking application scenarios and related attacks
    • A. Nikolaidis, S. Tsekeridou, A. Tefas, V. Solachidis
    • A. Nikolaidis, S. Tsekeridou, A. Tefas, and V. Solachidis, A Survey on watermarking application scenarios and related attacks, in: Proceedings of 2001 International Conference on Image Processing, vol. 3, pp. 991-994.
    • Proceedings of 2001 International Conference on Image Processing , vol.3 , pp. 991-994
  • 9
    • 34548056717 scopus 로고    scopus 로고
    • Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes
    • C. Chang, Y. Hsien, and C. Lin Lossless data embedding with high embedding capacity based on declustering for VQ-compressed codes IEEE Transactions on Information Forensics and Security 2 2007 493 498
    • (2007) IEEE Transactions on Information Forensics and Security , vol.2 , pp. 493-498
    • Chang, C.1    Hsien, Y.2    Lin, C.3
  • 10
    • 33947127547 scopus 로고    scopus 로고
    • Binary image authentication with tampering localization by embedding cryptographic signature and block identifier
    • H. Yang, and A.C. Kot Binary image authentication with tampering localization by embedding cryptographic signature and block identifier IEEE Signal Processing Letters 13 2006 741 744
    • (2006) IEEE Signal Processing Letters , vol.13 , pp. 741-744
    • Yang, H.1    Kot, A.C.2
  • 11
    • 20444404178 scopus 로고    scopus 로고
    • Steganalysis of LSB matching in grayscale images
    • A.D. Ker Steganalysis of LSB matching in grayscale images IEEE Signal Processing Letters 12 2005 441 444
    • (2005) IEEE Signal Processing Letters , vol.12 , pp. 441-444
    • Ker, A.D.1
  • 14
    • 77951206069 scopus 로고    scopus 로고
    • Geometric distortion insensitive image watermarking in affine covariant regions
    • X. Gao, and C. Deng Geometric distortion insensitive image watermarking in affine covariant regions IEEE Transactions on Systems, Man, Cybernetics, Part C 40 3 2010 278 286
    • (2010) IEEE Transactions on Systems, Man, Cybernetics, Part C , vol.40 , Issue.3 , pp. 278-286
    • Gao, X.1    Deng, C.2
  • 22
    • 28844486742 scopus 로고    scopus 로고
    • Reversible data embedding into images using wavelet techniques and sorting
    • L. Kamstra, and H. Heijmans Reversible data embedding into images using wavelet techniques and sorting IEEE Transactions on Image Processing 14 12 2005 2082 2090
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.12 , pp. 2082-2090
    • Kamstra, L.1    Heijmans, H.2
  • 29
    • 33847738550 scopus 로고    scopus 로고
    • Geometric invariant blind image watermarking by Tchebicheff moments
    • L. Zhang, G. Qian, W. Xiao, and Z. Ji Geometric invariant blind image watermarking by Tchebicheff moments Optics Express 15 5 2007 2251 2261
    • (2007) Optics Express , vol.15 , Issue.5 , pp. 2251-2261
    • Zhang, L.1    Qian, G.2    Xiao, W.3    Ji, Z.4
  • 32
    • 64549118174 scopus 로고    scopus 로고
    • A local Tchebichef moments-based robust image watermarking
    • C. Deng, and X. Gao A local Tchebichef moments-based robust image watermarking Signal Processing 89 8 Aug. 2009 1531 1539
    • (2009) Signal Processing , vol.89 , Issue.8 , pp. 1531-1539
    • Deng, C.1    Gao, X.2
  • 36
    • 0019047147 scopus 로고
    • Image analysis via the general theory of moments
    • M.R. Teague Image analysis via the general theory of moments Journal of Optical Society of America 70 1980 920 930
    • (1980) Journal of Optical Society of America , vol.70 , pp. 920-930
    • Teague, M.R.1
  • 38
  • 40
    • 50049090684 scopus 로고    scopus 로고
    • Noise analysis and reconstruction accuracy for Tchebichief moments
    • S. Elshoura, and D. Megherbi Noise analysis and reconstruction accuracy for Tchebichief moments Proceedings of IEEE Southeastcon 2008 521 526
    • (2008) Proceedings of IEEE Southeastcon , pp. 521-526
    • Elshoura, S.1    Megherbi, D.2
  • 41
    • 50649116414 scopus 로고    scopus 로고
    • Comparison of Zernike and Tchebicheff moments for image tampering detection sensitivity and watermark recovery
    • May
    • S. Elshoura, D. Megherbi, Comparison of Zernike and Tchebicheff moments for image tampering detection sensitivity and watermark recovery, in: Proceedings of IEEE Conference on Technologies for Home land Security, May 2008, pp. 615-619.
    • (2008) Proceedings of IEEE Conference on Technologies for Home Land Security , pp. 615-619
    • Elshoura, S.1    Megherbi, D.2
  • 43
    • 8744314608 scopus 로고    scopus 로고
    • What's the point? Interpolation or extrapolation with a regular grid DEM
    • Fredericksburg, VA, USA
    • D. Kidner, M. Dorey, D. Smith, What's the point? Interpolation or extrapolation with a regular grid DEM, in: International Conference on Geocomputation, Fredericksburg, VA, USA, 1999.
    • (1999) International Conference on Geocomputation
    • Kidner, D.1    Dorey, M.2    Smith, D.3
  • 45
    • 0030370716 scopus 로고    scopus 로고
    • A comparison of rotation-based methods for iterative reconstruction algorithms
    • E. Bella, A. Barclay, R. Eisner, and R. Schafer A comparison of rotation-based methods for iterative reconstruction algorithms IEEE Transactions on Nuclear Science 43 6 1996 3370 3376
    • (1996) IEEE Transactions on Nuclear Science , vol.43 , Issue.6 , pp. 3370-3376
    • Bella, E.1    Barclay, A.2    Eisner, R.3    Schafer, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.