메뉴 건너뛰기




Volumn 5, Issue 1, 2005, Pages 135-148

A CRYPTO SIGNATURE SCHEME for IMAGE AUTHENTICATION over WIRELESS CHANNEL

Author keywords

Authentication; digital signature; error concealment; image transmission; packet loss; watermark

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE CODING; IMAGE COMMUNICATION SYSTEMS; PACKET LOSS; WATERMARKING;

EID: 84884742176     PISSN: 02194678     EISSN: None     Source Type: Journal    
DOI: 10.1142/S0219467805001690     Document Type: Article
Times cited : (23)

References (14)
  • 1
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper-proofing and authentication
    • D. Kundur and D. Hatzinakos, "Digital watermarking for telltale tamper-proofing and authentication," Proc. of the IEEE 87(7), 1167-1180 (1999).
    • (1999) Proc. of the IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinakos, D.2
  • 2
    • 0035473830 scopus 로고    scopus 로고
    • Multipurpose watermarking for image authentication and protection
    • C.-S. Lu and H.-Y. M. Liao, "Multipurpose watermarking for image authentication and protection," IEEE Transactions on Image Processing 10(10), 1579-1592 (2001).
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1579-1592
    • Lu, C.-S.1    Liao, H.-Y.M.2
  • 3
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • C. W. Wu, "On the design of content-based multimedia authentication systems," IEEE Transactions on Multimedia 4, 385-393 (2002).
    • (2002) IEEE Transactions on Multimedia , vol.4 , pp. 385-393
    • Wu, C.W.1
  • 6
    • 11244291363 scopus 로고    scopus 로고
    • SARI: Self-authentication-and-recovery image system
    • C.-Y. Lin and S.-F. Chang, "SARI: Self-authentication-and-recovery image system," ACM Multimedia (2001).
    • (2001) ACM Multimedia
    • Lin, C.-Y.1    Chang, S.-F.2
  • 7
    • 0036290727 scopus 로고    scopus 로고
    • A new semi-fragile image authentication framework combining ECC and PKI infrastructure
    • Phoneix, USA
    • Q. Sun, S.-F. Chang, M. Kurato, and M. Suto, "A new semi-fragile image authentication framework combining ECC and PKI infrastructure," ISCAS2002, Phoneix, USA (2002).
    • (2002) ISCAS2002
    • Sun, Q.1    Chang, S.-F.2    Kurato, M.3    Suto, M.4
  • 8
    • 85180799647 scopus 로고    scopus 로고
    • Authenticating streamed data in the presence of random packet loss
    • P. Golle and N. Modadugu, "Authenticating streamed data in the presence of random packet loss," Proc. of the NDSS Symposium (2001). In http://cryptographic. stanford.edu/pgolle.
    • (2001) Proc. of the NDSS Symposium
    • Golle, P.1    Modadugu, N.2
  • 10
    • 11244286543 scopus 로고    scopus 로고
    • Zero-error information hiding capacity for digital images
    • October
    • C.-Y. Lin and S.-F. Chang, "Zero-error information hiding capacity for digital images," Proc. of ICIP (October 2001).
    • (2001) Proc. of ICIP
    • Lin, C.-Y.1    Chang, S.-F.2
  • 11
    • 0038760803 scopus 로고    scopus 로고
    • Content based error detection and concealment for image transmission over wireless channel
    • May), Thailand
    • S. Ye, X. Lin, and Q. Sun, "Content based error detection and concealment for image transmission over wireless channel," ISCAS2003 (May 2003), Thailand.
    • (2003) ISCAS2003
    • Ye, S.1    Lin, X.2    Sun, Q.3
  • 12
    • 0035763338 scopus 로고    scopus 로고
    • Using self-authentication-and-recovery images for error concealment in wireless environments
    • August
    • C.-Y. Lin, D. Sow, and S.-F. Chang, "Using self-authentication-and-recovery images for error concealment in wireless environments," SPIE ITCom (August 2001).
    • (2001) SPIE ITCom
    • Lin, C.-Y.1    Sow, D.2    Chang, S.-F.3
  • 14
    • 0032074052 scopus 로고    scopus 로고
    • Error control and concealment for video communication: A review
    • Y. Wang and Q. Zhu, "Error control and concealment for video communication: A review," Proc. of the IEEE 86(5), 974-997 (1998).
    • (1998) Proc. of the IEEE , vol.86 , Issue.5 , pp. 974-997
    • Wang, Y.1    Zhu, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.