메뉴 건너뛰기




Volumn 98, Issue , 2014, Pages 174-185

A novel reversible image authentication scheme for digital images

Author keywords

Digital signature; Fragile watermark; Image authentication; Random number generator; Tamper detection

Indexed keywords

AUTHENTICATION; CODES (SYMBOLS); ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; MILITARY PHOTOGRAPHY; NUMBER THEORY; PRINTING MACHINERY; RANDOM NUMBER GENERATION;

EID: 84890911035     PISSN: 01651684     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.sigpro.2013.11.028     Document Type: Article
Times cited : (73)

References (28)
  • 1
    • 0002500694 scopus 로고    scopus 로고
    • Image authentication techniques for surveillance applications
    • PII S0018921901084298
    • F. Bartolini, A. Tefas, M. Bami, and I. Pitas Image authentication techniques for surveillance applications Proc. IEEE 89 10 2001 1403 1418 (Pubitemid 33766629)
    • (2001) Proceedings of the IEEE , vol.89 , Issue.10 , pp. 1403-1418
    • Bartolini, F.1    Tefas, A.2    Barni, M.3    Pitas, I.4
  • 2
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • D.C. Lou, and J.L. Liu Fault resilient and compression tolerant digital signature for image authentication IEEE Trans. Consum. Electron. 46 1 2000 31 39
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.C.1    Liu, J.L.2
  • 3
    • 0035362493 scopus 로고    scopus 로고
    • Approximate image message authentication codes
    • L. Xie, G.R. Arce, and R.F. Graveman Approximate image message authentication codes IEEE Trans. Multimed. 3 2 2001 242 252
    • (2001) IEEE Trans. Multimed. , vol.3 , Issue.2 , pp. 242-252
    • Xie, L.1    Arce, G.R.2    Graveman, R.F.3
  • 4
    • 27844494781 scopus 로고    scopus 로고
    • A novel image authentication scheme based on quadtree segmentation
    • P.Y. Tsai, Y.C. Hu, and C.C. Chang A novel image authentication scheme based on quadtree segmentation Imaging Sci. J. 53 3 2005 149 162
    • (2005) Imaging Sci. J. , vol.53 , Issue.3 , pp. 149-162
    • Tsai, P.Y.1    Hu, Y.C.2    Chang, C.C.3
  • 5
    • 65649138758 scopus 로고    scopus 로고
    • Iterative compensation schemes for multimedia content authentication
    • S. Ababneh, R. Ansari, and A. Khokhar Iterative compensation schemes for multimedia content authentication J. Vis. Commun. Image Represent. 20 5 2009 303 311
    • (2009) J. Vis. Commun. Image Represent. , vol.20 , Issue.5 , pp. 303-311
    • Ababneh, S.1    Ansari, R.2    Khokhar, A.3
  • 6
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguish JPEG compression from malicious manipulation
    • C.Y. Lin, and S.F. Chang A robust image authentication method distinguish JPEG compression from malicious manipulation IEEE Trans. Circuits Syst. Video Technol. 11 2 2001 153 168
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans. Image Process. 10 10 2001 1593 1601 (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 8
    • 48149100935 scopus 로고    scopus 로고
    • Dual watermark for image tamper detection and recovery
    • T.Y. Lee, and S.D. Lin Dual watermark for image tamper detection and recovery Pattern Recognit. 41 11 2008 3497 3506
    • (2008) Pattern Recognit. , vol.41 , Issue.11 , pp. 3497-3506
    • Lee, T.Y.1    Lin, S.D.2
  • 9
    • 75249099043 scopus 로고    scopus 로고
    • A secure and robust hash-based scheme for image authentication
    • F. Ahmed, and M.Y. Siyal A secure and robust hash-based scheme for image authentication Signal Process. 90 5 2010 1456 1470
    • (2010) Signal Process. , vol.90 , Issue.5 , pp. 1456-1470
    • Ahmed, F.1    Siyal, M.Y.2
  • 10
    • 79551680643 scopus 로고    scopus 로고
    • A quantization-based semi-fragile watermarking scheme for image content authentication
    • X. Qi, and X. Xin A quantization-based semi-fragile watermarking scheme for image content authentication J. Vis. Commun. Image Represent. 22 2 2011 187 200
    • (2011) J. Vis. Commun. Image Represent. , vol.22 , Issue.2 , pp. 187-200
    • Qi, X.1    Xin, X.2
  • 11
    • 80052535001 scopus 로고    scopus 로고
    • An image authentication method by applying Hamming code on rearranged bits
    • C.S. Chan An image authentication method by applying Hamming code on rearranged bits Pattern Recognit. Lett. 32 14 2011 1679 1690
    • (2011) Pattern Recognit. Lett. , vol.32 , Issue.14 , pp. 1679-1690
    • Chan, C.S.1
  • 12
    • 82055208370 scopus 로고    scopus 로고
    • Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction
    • X.P. Zhang, Z.X. Qian, Y.L. Ren, and G.R. Feng Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction IEEE Trans. Inf. Forensics Secur. 6 4 2011 1223 1232
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , Issue.4 , pp. 1223-1232
    • Zhang, X.P.1    Qian, Z.X.2    Ren, Y.L.3    Feng, G.R.4
  • 13
    • 83955162216 scopus 로고    scopus 로고
    • Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism
    • C. Qin, C.C. Chang, and P.Y. Chen Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism Signal Process. 92 4 2012 1137 1150
    • (2012) Signal Process. , vol.92 , Issue.4 , pp. 1137-1150
    • Qin, C.1    Chang, C.C.2    Chen, P.Y.3
  • 14
    • 79957706020 scopus 로고    scopus 로고
    • An adaptive image authentication scheme for vector quantization compressed image
    • J.C. Chuang, and Y.C. Hu An adaptive image authentication scheme for vector quantization compressed image J. Vis. Commun. Image Represent. 22 5 2011 440 449
    • (2011) J. Vis. Commun. Image Represent. , vol.22 , Issue.5 , pp. 440-449
    • Chuang, J.C.1    Hu, Y.C.2
  • 15
    • 84871946125 scopus 로고    scopus 로고
    • A novel tamper detection scheme for BTC compressed images
    • Y.C. Hu, W.L. Chen, C.C. Lo, and C.M. Wu A novel tamper detection scheme for BTC compressed images Opto-Electron. Rev. 21 1 2013 137 146
    • (2013) Opto-Electron. Rev. , vol.21 , Issue.1 , pp. 137-146
    • Hu, Y.C.1    Chen, W.L.2    Lo, C.C.3    Wu, C.M.4
  • 16
    • 84879989159 scopus 로고    scopus 로고
    • Joint image coding and image authentication based on AMBTC
    • (article no.: 013012)
    • Y.C. Hu, C.C. Lo, W.L. Chen, and C.H. Wen Joint image coding and image authentication based on AMBTC J. Electron. Imaging 22 1 2013 (article no.: 013012)
    • (2013) J. Electron. Imaging , vol.22 , Issue.1
    • Hu, Y.C.1    Lo, C.C.2    Chen, W.L.3    Wen, C.H.4
  • 17
    • 84875880417 scopus 로고    scopus 로고
    • Robust image hashing using ring-based entropies
    • Z. Tang, X. Zhang, L. Huang, and Y. Dai Robust image hashing using ring-based entropies Signal Process. 93 7 2013 2061 2069
    • (2013) Signal Process. , vol.93 , Issue.7 , pp. 2061-2069
    • Tang, Z.1    Zhang, X.2    Huang, L.3    Dai, Y.4
  • 18
    • 70350710022 scopus 로고    scopus 로고
    • Digital image steganography: Survey and analysis of current methods
    • A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt Digital image steganography: survey and analysis of current methods Signal Process. 90 3 2010 727 752
    • (2010) Signal Process. , vol.90 , Issue.3 , pp. 727-752
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Mc Kevitt, P.4
  • 20
    • 60749112009 scopus 로고    scopus 로고
    • Reversible image hiding scheme using predictive coding and histogram shifting
    • P.Y. Tsai, Y.C. Hu, and H.L. Yeh Reversible image hiding scheme using predictive coding and histogram shifting Signal Process. 89 6 2009 1129 1143
    • (2009) Signal Process. , vol.89 , Issue.6 , pp. 1129-1143
    • Tsai, P.Y.1    Hu, Y.C.2    Yeh, H.L.3
  • 21
    • 84878656390 scopus 로고    scopus 로고
    • A novel reversible data hiding scheme based on two-dimensional difference-histogram modification
    • X. Li, W. Zhang, X. Gui, and B. Yang A novel reversible data hiding scheme based on two-dimensional difference-histogram modification IEEE Trans. Inf. Forensics Secur. 8 7 2013 1091 1100
    • (2013) IEEE Trans. Inf. Forensics Secur. , vol.8 , Issue.7 , pp. 1091-1100
    • Li, X.1    Zhang, W.2    Gui, X.3    Yang, B.4
  • 22
    • 84875220373 scopus 로고    scopus 로고
    • Reversible data hiding scheme based on neighboring pixel differences
    • Y.Y. Tsai, D.S. Tsai, and C.L. Liu Reversible data hiding scheme based on neighboring pixel differences Digital Signal Process.: Rev. J. 23 3 2013 919 927
    • (2013) Digital Signal Process.: Rev. J. , vol.23 , Issue.3 , pp. 919-927
    • Tsai, Y.Y.1    Tsai, D.S.2    Liu, C.L.3
  • 23
    • 0141862029 scopus 로고    scopus 로고
    • Reversible data embedding using a difference expansion
    • J. Tian Reversible data embedding using a difference expansion IEEE Trans. Circuits Syst. Video Technol. 13 8 2003 890 896
    • (2003) IEEE Trans. Circuits Syst. Video Technol. , vol.13 , Issue.8 , pp. 890-896
    • Tian, J.1
  • 25
    • 84877279434 scopus 로고    scopus 로고
    • Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation
    • J. Li, X. Li, and B. Yang Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation Signal Process. 93 9 2013 2748 2758
    • (2013) Signal Process. , vol.93 , Issue.9 , pp. 2748-2758
    • Li, J.1    Li, X.2    Yang, B.3
  • 26
    • 42449100313 scopus 로고    scopus 로고
    • Reversible data hiding using the companding technique and improved de method
    • S. Weng, Y. Zhao, J.S. Pan, and R. Ni Reversible data hiding using the companding technique and improved DE method Circuits Syst. Signal Process. 27 2 2008 229 245
    • (2008) Circuits Syst. Signal Process. , vol.27 , Issue.2 , pp. 229-245
    • Weng, S.1    Zhao, Y.2    Pan, J.S.3    Ni, R.4
  • 27
    • 84872675370 scopus 로고    scopus 로고
    • A reversible data hiding method by histogram shifting in high quality medical images
    • L.C. Huang, L.Y. Tseng, and M.S. Hwang A reversible data hiding method by histogram shifting in high quality medical images J. Syst. Software 86 3 2013 716 727
    • (2013) J. Syst. Software , vol.86 , Issue.3 , pp. 716-727
    • Huang, L.C.1    Tseng, L.Y.2    Hwang, M.S.3
  • 28
    • 84905971572 scopus 로고    scopus 로고
    • High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting
    • in press
    • T.C. Lu, C.C. Chang, Y.H. Huang, High capacity reversible hiding scheme based on interpolation, difference expansion, and histogram shifting, Multimed. Tools Appl., 10.1007/s11042-013-1369-0, in press
    • Multimed. Tools Appl.
    • Lu, T.C.1    Chang, C.C.2    Huang, Y.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.