메뉴 건너뛰기




Volumn 22, Issue 1, 2013, Pages

Joint image coding and image authentication based on absolute moment block truncation coding

Author keywords

[No Author keywords available]

Indexed keywords

ABSOLUTE MOMENT BLOCK TRUNCATION CODING; AUTHENTICATION CODES; AUTHENTICATION DATA; EMBEDDED IMAGES; IMAGE AUTHENTICATION; PSEUDORANDOM SEQUENCES; QUANTIZATION LEVELS; STORAGE COSTS;

EID: 84879989159     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.JEI.22.1.013012     Document Type: Article
Times cited : (49)

References (26)
  • 2
    • 0021515479 scopus 로고
    • Absolute moment block truncation coding and its application to color images
    • M. D. Lema and O. R. Mitchell, "Absolute moment block truncation coding and its application to color image," IEEE Trans. Commun. 32(10), 1148-1157 (1984). (Pubitemid 14671306)
    • (1984) IEEE Transactions on Communications , vol.COM-32 , Issue.10 , pp. 1148-1157
    • Lema, M.D.1    Mitchell, O.R.2
  • 3
    • 0042976319 scopus 로고    scopus 로고
    • Low-complexity and low-bit-rate image compression scheme based on AMBTC
    • Y. C. Hu, "Low-complexity and low-bit-rate image compression scheme based on AMBTC," Opt. Eng. 42(7), 1964-1975 (2003).
    • (2003) Opt. Eng , vol.42 , Issue.7 , pp. 1964-1975
    • Hu, Y.C.1
  • 4
    • 54549096836 scopus 로고    scopus 로고
    • Color image coding scheme using absolute moment block truncation coding and block prediction technique
    • Y. C. Hu, B. H. Su, and P. Y. Tsai, "Color image coding scheme using absolute moment block truncation coding and block prediction technique," Imaging Sci. J. 56(5), 254-270 (2008).
    • (2008) Imaging Sci. J , vol.56 , Issue.5 , pp. 254-270
    • Hu, Y.C.1    Su, B.H.2    Tsai, P.Y.3
  • 6
    • 0036703236 scopus 로고    scopus 로고
    • A novel two-stage edge detection scheme for digital color images
    • P. Y. Tsai, C. C. Chang, and Y. C. Hu, "A novel two-stage edge detection scheme for digital color images," R. Time Imag. 8(4), 329-343 (2002).
    • (2002) R. Time Imag , vol.8 , Issue.4 , pp. 329-343
    • Tsai, P.Y.1    Chang, C.C.2    Hu, Y.C.3
  • 7
    • 58049217733 scopus 로고    scopus 로고
    • A BTC-based watermarking scheme for digital images
    • S. F. Tu and C. S. Hsu, "A BTC-based watermarking scheme for digital images," Inf. Sec. 15(2), 214-226 (2004).
    • (2004) Inf. Sec , vol.15 , Issue.2 , pp. 214-226
    • Tu, S.F.1    Hsu, C.S.2
  • 8
    • 66049131563 scopus 로고    scopus 로고
    • Watermarking in conjugate ordered dither block truncation coding images
    • J. M. Guo, M. F. Wu, and Y. C. Kang, "Watermarking in conjugate ordered dither block truncation coding images," Signal Process. 89(10), 1864-1882 (2009).
    • (2009) Signal Process , vol.89 , Issue.10 , pp. 1864-1882
    • Guo, J.M.1    Wu, M.F.2    Kang, Y.C.3
  • 9
    • 77954718010 scopus 로고    scopus 로고
    • Joint compression/watermarking scheme using majority-parity guidance and halftoning-based block truncation coding
    • J. M. Guo and Y. F. Liu, "Joint compression/watermarking scheme using majority-parity guidance and halftoning-based block truncation coding," IEEE Trans. Image Process. 19(8), 2056-2069 (2010).
    • (2010) IEEE Trans. Image Process , vol.19 , Issue.8 , pp. 2056-2069
    • Guo, J.M.1    Liu, Y.F.2
  • 10
    • 55549099235 scopus 로고    scopus 로고
    • A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding
    • C. C. Chang, Y. H. Chen, and C. C. Lin, "A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding," Soft Comput. 13(4), 321-331 (2009).
    • (2009) Soft Comput , vol.13 , Issue.4 , pp. 321-331
    • Chang, C.C.1    Chen, Y.H.2    Lin, C.C.3
  • 11
    • 41549096759 scopus 로고    scopus 로고
    • Lossless data hiding for color images based on block truncation coding
    • C. C. Chang, C. Y. Lin, and Y. H. Fan, "Lossless data hiding for color images based on block truncation coding," Pattern Recognit. 41(7), 2347-2357 (2008).
    • (2008) Pattern Recognit , vol.41 , Issue.7 , pp. 2347-2357
    • Chang, C.C.1    Lin, C.Y.2    Fan, Y.H.3
  • 12
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • PII S0018921901084298
    • F. Bartolini et al., "Image authentication techniques for surveillance applications," Proc. IEEE 89(10), 1403-1418 (2001). (Pubitemid 33766629)
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 13
    • 0035362493 scopus 로고    scopus 로고
    • Approximate image message authentication codes
    • L. Xie, G. R. Arce, and R. F. Graveman, "Approximate image message authentication codes," IEEE Trans. Multimed. 3(2), 242-252 (2001).
    • (2001) IEEE Trans. Multimed , vol.3 , Issue.2 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graveman, R.F.3
  • 14
    • 27844494781 scopus 로고    scopus 로고
    • A novel image authentication scheme based on quadtree segmentation
    • P. Y. Tsai, Y. C. Hu, and C. C. Chang, "A novel image authentication scheme based on quadtree segmentation," Imaging Sci. J. 53(3), 149-162 (2005).
    • (2005) Imaging Sci. J , vol.53 , Issue.3 , pp. 149-162
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 15
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on Hamming code
    • C. S. Chan and C. C. Chang, "An efficient image authentication method based on Hamming code," Pattern Recognit. 40(2), 681-691 (2007).
    • (2007) Pattern Recognit , vol.40 , Issue.2 , pp. 681-691
    • Chan, C.S.1    Chang, C.C.2
  • 16
    • 65649138758 scopus 로고    scopus 로고
    • Iterative compensation schemes for multimedia content authentication
    • S. Ababneh, R. Ansari, and A. Khokhar, "Iterative compensation schemes for multimedia content authentication," J. Vis. Commun. Image Represent. 20(5), 303-311 (2009).
    • (2009) J. Vis. Commun. Image Represent , vol.20 , Issue.5 , pp. 303-311
    • Ababneh, S.1    Ansari, R.2    Khokhar, A.3
  • 17
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguish JPEG compression from malicious manipulation
    • C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation," IEEE Trans. Circ. Syst. Video Tech. 11(2), 153-168 (2001).
    • (2001) IEEE Trans. Circ. Syst. Video Tech , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 18
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. Image Process. 10(10), 1593-1601 (2001). (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 19
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical trees to authenticate digital images
    • P. Y. Tsai, Y. C. Hu, and C. C. Chang, "Using set partitioning in hierarchical trees to authenticate digital images," Signal Process. Image Commun. 18(9), 813-822 (2003).
    • (2003) Signal Process. Image Commun , vol.18 , Issue.9 , pp. 813-822
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 20
    • 33748119112 scopus 로고    scopus 로고
    • Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques
    • W. N. Lie, G. S. Lin, and S. L. Chen, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques," IEEE Trans. Inf. Foren. Sec. 1(3), 330-341 (2006).
    • (2006) IEEE Trans. Inf. Foren. Sec , vol.1 , Issue.3 , pp. 330-341
    • Lie, W.N.1    Lin, G.S.2    Chen, S.L.3
  • 21
    • 40549093361 scopus 로고    scopus 로고
    • Fragility and robustness of binary-phase-only-filter-based fragile/ semifragile digital image watermarking
    • DOI 10.1109/TIM.2007.911585
    • S. Jun and M. S. Alam, "Fragility and robustness of binary-phase-onlyfilter-based fragile/semifragile digital image watermarking," IEEE Trans. Instrum. Meas. 57(3), 595-606 (2008). (Pubitemid 351359254)
    • (2008) IEEE Transactions on Instrumentation and Measurement , vol.57 , Issue.3 , pp. 595-606
    • Sang, J.1    Alam, M.S.2
  • 22
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognit. 41(11), 3497-3506 (2008).
    • (2008) Pattern Recognit , vol.41 , Issue.11 , pp. 3497-3506
    • Lee, T.Y.1    Lin, S.D.2
  • 23
    • 79551680643 scopus 로고    scopus 로고
    • A quantization-based semi-fragile watermarking scheme for image content authentication
    • X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication," J. Vis. Commun. Image Represent. 22(2), 187-200 (2011).
    • (2011) J. Vis. Commun. Image Represent , vol.22 , Issue.2 , pp. 18-200
    • Qi, X.1    Xin, X.2
  • 24
    • 79957706020 scopus 로고    scopus 로고
    • An adaptive image authentication scheme for vector quantization compressed image
    • J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image," J. Vis. Commun. Image Represent. 22(5), 440-449 (2011).
    • (2011) J. Vis. Commun. Image Represent , vol.22 , Issue.5 , pp. 440-449
    • Chuang, J.C.1    Hu, Y.C.2
  • 25
    • 81755185936 scopus 로고    scopus 로고
    • Tampering attacks on binary phase only filter-based watermarking schemes for image authentication
    • C. Gang, Z. Yao, and N. Rongrong, "Tampering attacks on binary phase only filter-based watermarking schemes for image authentication," Opt. Eng. 50(5), 057004 (2011).
    • (2011) Opt. Eng , vol.50 , Issue.5 , pp. 057004
    • Gang, C.1    Yao, Z.2    Rongrong, N.3
  • 26
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication systems
    • C. Fei, D. Kundur, and R. H. Kwong, "Analysis and design of secure watermark-based authentication systems," IEEE Trans. Inf. Foren. Sec. 1(1), 43-55 (2006).
    • (2006) IEEE Trans. Inf. Foren. Sec , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.