메뉴 건너뛰기




Volumn , Issue , 2013, Pages 86-93

Counterfeiting attacks on block-wise dependent fragile watermarking schemes

Author keywords

Authentication; Counterfeiting attacks; Fragile watermark

Indexed keywords

ATTACK MODEL; COUNTERFEITING ATTACK; FRAGILE WATERMARK; FRAGILE WATERMARKING; SECURITY LEVEL; WATERMARKED IMAGES; WATERMARKING SCHEMES; WEAK CORRELATION;

EID: 84893290811     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2523514.2523530     Document Type: Conference Paper
Times cited : (8)

References (19)
  • 1
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • IEEE Transactions on
    • F. Cayre, C. Fontaine, and T. Furon. Watermarking security: theory and practice. Signal Processing, IEEE Transactions on, 53(10): 3976-3987, 2005.
    • (2005) Signal Processing , vol.53 , Issue.10 , pp. 3976-3987
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 2
    • 13244269881 scopus 로고    scopus 로고
    • Lossless generalized-lsb data embedding
    • IEEE Transactions on
    • M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber. Lossless generalized-lsb data embedding. Image Processing, IEEE Transactions on, 14(2): 253-266, 2005.
    • (2005) Image Processing , vol.14 , Issue.2 , pp. 253-266
    • Celik, M.U.1    Sharma, G.2    Tekalp, A.M.3    Saber, E.4
  • 3
    • 34848926024 scopus 로고    scopus 로고
    • Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery
    • C.-C. Chang, Y.-H. Fan, and W.-L. Tai. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, 41(2): 654-661, 2008.
    • (2008) Pattern Recognition , vol.41 , Issue.2 , pp. 654-661
    • Chang, C.-C.1    Fan, Y.-H.2    Tai, W.-L.3
  • 5
    • 84893226982 scopus 로고    scopus 로고
    • An efficient block-based fragile watermarking system for tamper localization and recovery
    • chapter 10 CRC Press, August
    • V. G. Edupuganti, F. Y. Shih, and I.-C. Chang. An efficient block-based fragile watermarking system for tamper localization and recovery. In Multimedia Security, chapter 10, pages 181-198. CRC Press, August 2012.
    • (2012) Multimedia Security , pp. 181-198
    • Edupuganti, V.G.1    Shih, F.Y.2    Chang, I.-C.3
  • 6
    • 0036488240 scopus 로고    scopus 로고
    • Lossless data embedding-new paradigm in digital watermarking
    • (Compendex)
    • J. Fridrich, M. Goljan, and R. Du. Lossless data embedding-new paradigm in digital watermarking. Eurasip Journal on Applied Signal Processing, 2002(Compendex): 185-196, 2002.
    • (2002) Eurasip Journal on Applied Signal Processing , vol.2002 , pp. 185-196
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 7
    • 0036530306 scopus 로고    scopus 로고
    • Cryptanalysis of the yeung-mintzer fragile watermarking technique
    • (Compendex)
    • J. Fridrich, M. Goljan, and N. Memon. Cryptanalysis of the yeung-mintzer fragile watermarking technique. Journal of Electronic Imaging, 11(Compendex): 262-274, 2002.
    • (2002) Journal of Electronic Imaging , vol.11 , pp. 262-274
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 9
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman and N. Memon. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 9: 432-441, 2000.
    • (2000) IEEE Transactions on Image Processing , vol.9 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 10
    • 0035790994 scopus 로고    scopus 로고
    • Considerations on watermarking security
    • 2001 IEEE Fourth Workshop on
    • T. Kalker. Considerations on watermarking security. In Multimedia Signal Processing, 2001 IEEE Fourth Workshop on, pages 201-206, 2001.
    • (2001) Multimedia Signal Processing , pp. 201-206
    • Kalker, T.1
  • 11
    • 78049498166 scopus 로고    scopus 로고
    • Experiment of tamper detection and recovery watermarking in picture archiving and communication systems
    • 2010. Export Date: 6 December 2010 Source: Scopus
    • S. C. Liew and J. M. Zain. Experiment of tamper detection and recovery watermarking in picture archiving and communication systems. Journal of Computer Science, 6(7): 794-799, 2010. Export Date: 6 December 2010 Source: Scopus.
    • Journal of Computer Science , vol.6 , Issue.7 , pp. 794-799
    • Liew, S.C.1    Zain, J.M.2
  • 12
    • 25144448272 scopus 로고    scopus 로고
    • A hierarchical digital watermarking method for image tamper detection and recovery
    • P. L. Lin, C.-K. Hsieh, and P.-W. Huang. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, 38(12): 2519-2529, 2005.
    • (2005) Pattern Recognition , vol.38 , Issue.12 , pp. 2519-2529
    • Lin, P.L.1    Hsieh, C.-K.2    Huang, P.-W.3
  • 16
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • IEEE Transactions on
    • M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp. Hierarchical watermarking for secure image authentication with localization. Image Processing, IEEE Transactions on, 11(6): 585-595, 2002.
    • (2002) Image Processing , vol.11 , Issue.6 , pp. 585-595
    • Utku Celik, M.1    Sharma, G.2    Saber, E.3    Murat Tekalp, A.4
  • 17
    • 0035369792 scopus 로고    scopus 로고
    • Attack modelling: Towards a second generation watermarking benchmark
    • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modelling: towards a second generation watermarking benchmark. Signal Processing, 81(6): 1177-1214, 2001.
    • (2001) Signal Processing , vol.81 , Issue.6 , pp. 1177-1214
    • Voloshynovskiy, S.1    Pereira, S.2    Iquise, V.3    Pun, T.4
  • 18
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • Proceedings., International Conference on IEEE
    • M. M. Yeung and F. Mintzer. An invisible watermarking technique for image verification. In Image Processing, 1997. Proceedings., International Conference on, Volume 2, pages 680-683. IEEE, 1997.
    • (1997) Image Processing, 1997 , vol.2 , pp. 680-683
    • Yeung, M.M.1    Mintzer, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.