메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Two-layer fragile watermarking method secured with chaotic map for authentication of digital holy Quran

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; CHAOTIC DYNAMICS; DIGITAL HOLY QURAN; EMBEDDING; FORGERY; IMAGE PROCESSING; IMAGE QUALITY; MOBILE APPLICATION; SIGNAL NOISE RATIO; SIGNAL PROCESSING; SPATIAL ANALYSIS; TWO LAYER FRAGILE WATERMARKING METHOD; WAVELET ANALYSIS; ALGORITHM; COMPUTER GRAPHICS; INFORMATION PROCESSING; PROCEDURES; STANDARDS;

EID: 84902148014     PISSN: 23566140     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2014/803983     Document Type: Article
Times cited : (13)

References (58)
  • 1
    • 84902173693 scopus 로고    scopus 로고
    • http://greyfalcon.us/restored/Himmler%20fake.htm
  • 5
    • 0036544390 scopus 로고    scopus 로고
    • Toward secure public-key blockwise fragile authentication watermarking
    • DOI 10.1049/ip-vis:20020168
    • Barreto P. S. L. M., Kim H. Y., Rijmen V., Toward secure public-key blockwise fragile authentication watermarking. IEE Proceedings: Vision, Image and Signal Processing 2002 149 2 57 62 2-s2.0-0036544390 10.1049/ip-vis:20020168 (Pubitemid 34750620)
    • (2002) IEE Proceedings: Vision, Image and Signal Processing , vol.149 , Issue.2 , pp. 57-62
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Rijmen, V.3
  • 7
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • DOI 10.1109/83.826780
    • Holliman M., Memon N., Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 2000 9 3 432 441 2-s2.0-0033872149 10.1109/83.826780 (Pubitemid 30572357)
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 8
    • 0033703669 scopus 로고    scopus 로고
    • Security and Watermarking of Multimedia Contents II January 2000 San Jose, Calif, USA Proceedings of SPIE 2-s2.0-0033703669
    • Fridrich J., Goljan M., Memon N., Further attacks on Yeung-Mintzer fragile watermarking scheme. 3971 Security and Watermarking of Multimedia Contents II January 2000 San Jose, Calif, USA 428 437 Proceedings of SPIE 2-s2.0-0033703669
    • Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme , vol.3971 , pp. 428-437
    • Fridrich, J.1    Goljan, M.2    Memon, N.3
  • 9
    • 1542363253 scopus 로고    scopus 로고
    • On the security of the Yeung-Mintzer authentication watermark
    • March Savannah, Ga, USA 2-s2.0-1542363253
    • Memon N., Shende S., Wong P. W., On the security of the Yeung-Mintzer authentication watermark. Proceedings of the IS & T PICS Symposium March 1999 Savannah, Ga, USA 301 306 2-s2.0-1542363253
    • (1999) Proceedings of the IS & T PICS Symposium , pp. 301-306
    • Memon, N.1    Shende, S.2    Wong, P.W.3
  • 10
    • 84870428915 scopus 로고    scopus 로고
    • Google Play. https://play.google.com/store
    • Google Play
  • 12
    • 8344236008 scopus 로고    scopus 로고
    • Fragile image watermarking using a gradient image for improved localization and security
    • 2-s2.0-8344236008 10.1016/j.patrec.2004.08.017
    • Suthaharan S., Fragile image watermarking using a gradient image for improved localization and security. Pattern Recognition Letters 2004 25 16 1893 1903 2-s2.0-8344236008 10.1016/j.patrec.2004.08.017
    • (2004) Pattern Recognition Letters , vol.25 , Issue.16 , pp. 1893-1903
    • Suthaharan, S.1
  • 13
    • 35349002199 scopus 로고    scopus 로고
    • Fragile watermarking scheme for digital image authentication using pixel difference
    • 2-s2.0-35349002199 10.1179/174313107X165227
    • Chang C.-C., Lin P.-Y., Chuang J.-C., Fragile watermarking scheme for digital image authentication using pixel difference. Imaging Science Journal 2007 55 3 140 147 2-s2.0-35349002199 10.1179/174313107X165227
    • (2007) Imaging Science Journal , vol.55 , Issue.3 , pp. 140-147
    • Chang, C.-C.1    Lin, P.-Y.2    Chuang, J.-C.3
  • 14
    • 84870243382 scopus 로고    scopus 로고
    • Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain
    • Preda R. O., Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain. Measurement 2013 46 367 373
    • (2013) Measurement , vol.46 , pp. 367-373
    • Preda, R.O.1
  • 15
    • 33644995185 scopus 로고    scopus 로고
    • Analysis and design of secure watermark-based authentication systems
    • 2-s2.0-33644995185 10.1109/TIFS.2005.863505
    • Fei C., Kundur D., Kwong R. H., Analysis and design of secure watermark-based authentication systems. IEEE Transactions on Information Forensics and Security 2006 1 1 43 55 2-s2.0-33644995185 10.1109/TIFS.2005. 863505
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.1 , pp. 43-55
    • Fei, C.1    Kundur, D.2    Kwong, R.H.3
  • 16
    • 33750303836 scopus 로고    scopus 로고
    • An efficient image authentication method based on Hamming code
    • DOI 10.1016/j.patcog.2006.05.018, PII S003132030600238X
    • Chan C.-S., Chang C.-C., An efficient image authentication method based on Hamming code. Pattern Recognition 2007 40 2 681 690 2-s2.0-33750303836 10.1016/j.patcog.2006.05.018 (Pubitemid 44635649)
    • (2007) Pattern Recognition , vol.40 , Issue.2 , pp. 681-690
    • Chan, C.-S.1    Chang, C.-C.2
  • 17
    • 80053006913 scopus 로고    scopus 로고
    • Protecting the content integrity of digital imagery with fidelity preservation
    • 2-s2.0-80053006913 10.1145/2000486.2000489
    • Lin P.-Y., Lee J.-S., Chang C.-C., Protecting the content integrity of digital imagery with fidelity preservation. ACM Transactions on Multimedia Computing, Communications and Applications 2011 7 3, article 15 20 2-s2.0-80053006913 10.1145/2000486.2000489
    • (2011) ACM Transactions on Multimedia Computing, Communications and Applications , vol.7 , Issue.3 , pp. 20
    • Lin, P.-Y.1    Lee, J.-S.2    Chang, C.-C.3
  • 18
    • 0142029533 scopus 로고    scopus 로고
    • Using set partitioning in hierarchical trees to authenticate digital images
    • 2-s2.0-0142029533 10.1016/j.image.2003.06.001
    • Tsai P., Hu Y.-C., Chang C.-C., Using set partitioning in hierarchical trees to authenticate digital images. Signal Processing: Image Communication 2003 18 9 813 822 2-s2.0-0142029533 10.1016/j.image.2003.06.001
    • (2003) Signal Processing: Image Communication , vol.18 , Issue.9 , pp. 813-822
    • Tsai, P.1    Hu, Y.-C.2    Chang, C.-C.3
  • 19
    • 4444342040 scopus 로고    scopus 로고
    • Secret image sharing with steganography and authentication
    • 2-s2.0-4444342040 10.1016/S0164-1212(03)00239-5
    • Lin C.-C., Tsai W.-H., Secret image sharing with steganography and authentication. Journal of Systems and Software 2004 73 3 405 414 2-s2.0-4444342040 10.1016/S0164-1212(03)00239-5
    • (2004) Journal of Systems and Software , vol.73 , Issue.3 , pp. 405-414
    • Lin, C.-C.1    Tsai, W.-H.2
  • 20
    • 0037818310 scopus 로고    scopus 로고
    • Structural digital signature for image authentication: An incidental distortion resistant scheme
    • 2-s2.0-0037818310 10.1109/TMM.2003.811621
    • Lu C.-S., Liao H.-Y. M., Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Transactions on Multimedia 2003 5 2 161 173 2-s2.0-0037818310 10.1109/TMM.2003.811621
    • (2003) IEEE Transactions on Multimedia , vol.5 , Issue.2 , pp. 161-173
    • Lu, C.-S.1    Liao, H.-Y.M.2
  • 21
    • 48149104075 scopus 로고    scopus 로고
    • Tampering with a watermarking-based image authentication scheme
    • 2-s2.0-48149104075 10.1016/j.patcog.2008.05.009
    • Phan R. C.-W., Tampering with a watermarking-based image authentication scheme. Pattern Recognition 2008 41 11 3493 3496 2-s2.0-48149104075 10.1016/j.patcog.2008.05.009
    • (2008) Pattern Recognition , vol.41 , Issue.11 , pp. 3493-3496
    • Phan, R.C.-W.1
  • 22
    • 0036627368 scopus 로고    scopus 로고
    • A survey of watermarking algorithms for image authentication
    • 2-s2.0-0036627368 10.1155/S1110865702204047
    • Rey C., Dugelay J.-L., A survey of watermarking algorithms for image authentication. Eurasip Journal on Applied Signal Processing 2002 2002 6 613 621 2-s2.0-0036627368 10.1155/S1110865702204047
    • (2002) Eurasip Journal on Applied Signal Processing , vol.2002 , Issue.6 , pp. 613-621
    • Rey, C.1    Dugelay, J.-L.2
  • 23
    • 0142057129 scopus 로고    scopus 로고
    • A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function
    • DOI 10.1016/S0031-3203(03)00221-8
    • Thien C.-C., Lin J.-C., A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 2003 36 12 2875 2881 2-s2.0-0142057129 10.1016/S0031-3203(03)00221-8 (Pubitemid 37293400)
    • (2003) Pattern Recognition , vol.36 , Issue.12 , pp. 2875-2881
    • Thien, C.-C.1    Lin, J.-C.2
  • 24
    • 80052030265 scopus 로고    scopus 로고
    • An efficient wavelet-tree-based watermarking method
    • 2-s2.0-80052030265 10.1016/j.eswa.2011.03.024
    • Run R.-S., Horng S.-J., Lin W.-H., Kao T.-W., Fan P., Khan M. K., An efficient wavelet-tree-based watermarking method. Expert Systems with Applications 2011 38 12 14357 14366 2-s2.0-80052030265 10.1016/j.eswa.2011.03. 024
    • (2011) Expert Systems with Applications , vol.38 , Issue.12 , pp. 14357-14366
    • Run, R.-S.1    Horng, S.-J.2    Lin, W.-H.3    Kao, T.-W.4    Fan, P.5    Khan, M.K.6
  • 25
    • 32644434350 scopus 로고    scopus 로고
    • A watermarking-based image ownership and tampering authentication scheme
    • 2-s2.0-32644434350 10.1016/j.patrec.2005.09.006
    • Chang C.-C., Hu Y.-S., Lu T.-C., A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 2006 27 5 439 446 2-s2.0-32644434350 10.1016/j.patrec.2005.09.006
    • (2006) Pattern Recognition Letters , vol.27 , Issue.5 , pp. 439-446
    • Chang, C.-C.1    Hu, Y.-S.2    Lu, T.-C.3
  • 26
    • 67651102858 scopus 로고    scopus 로고
    • A secure and improved self-embedding algorithm to combat digital document forgery
    • 2-s2.0-67651102858 10.1016/j.sigpro.2009.02.001
    • Cheddad A., Condell J., Curran K., Mc Kevitt P., A secure and improved self-embedding algorithm to combat digital document forgery. Signal Processing 2009 89 12 2324 2332 2-s2.0-67651102858 10.1016/j.sigpro.2009.02.001
    • (2009) Signal Processing , vol.89 , Issue.12 , pp. 2324-2332
    • Cheddad, A.1    Condell, J.2    Curran, K.3    Mc Kevitt, P.4
  • 27
    • 34548765996 scopus 로고    scopus 로고
    • Statistical fragile watermarking capable of locating individual tampered pixels
    • DOI 10.1109/LSP.2007.896436
    • Zhang X., Wang S., Statistical fragile watermarking capable of locating individual tampered pixels. IEEE Signal Processing Letters 2007 14 10 727 730 2-s2.0-34548765996 10.1109/LSP.2007.896436 (Pubitemid 47434095)
    • (2007) IEEE Signal Processing Letters , vol.14 , Issue.10 , pp. 727-730
    • Zhang, X.1    Wang, S.2
  • 28
    • 57749202706 scopus 로고    scopus 로고
    • Fragile watermarking scheme using a hierarchical mechanism
    • 2-s2.0-57749202706 10.1016/j.sigpro.2008.10.001
    • Zhang X., Wang S., Fragile watermarking scheme using a hierarchical mechanism. Signal Processing 2009 89 4 675 679 2-s2.0-57749202706 10.1016/j.sigpro.2008.10.001
    • (2009) Signal Processing , vol.89 , Issue.4 , pp. 675-679
    • Zhang, X.1    Wang, S.2
  • 29
    • 33750216800 scopus 로고    scopus 로고
    • Multiple image watermarking applied to health information management
    • DOI 10.1109/TITB.2006.875655
    • Giakoumaki A., Pavlopoulos S., Koutsouris D., Multiple image watermarking applied to health information management. IEEE Transactions on Information Technology in Biomedicine 2006 10 4 722 732 2-s2.0-33750216800 10.1109/TITB.2006.875655 (Pubitemid 44604902)
    • (2006) IEEE Transactions on Information Technology in Biomedicine , vol.10 , Issue.4 , pp. 722-732
    • Giakoumaki, A.1    Pavlopoulos, S.2    Koutsouris, D.3
  • 31
    • 49549116187 scopus 로고    scopus 로고
    • Fragile watermarking based on encoding of the zeroes of the z-transform
    • 2-s2.0-49549116187 10.1109/TIFS.2008.926994
    • Ho A. T. S., Zhu X., Shen J., Marziliano P., Fragile watermarking based on encoding of the zeroes of the z-transform. IEEE Transactions on Information Forensics and Security 2008 3 3 567 569 2-s2.0-49549116187 10.1109/TIFS.2008. 926994
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.3 , pp. 567-569
    • Ho, A.T.S.1    Zhu, X.2    Shen, J.3    Marziliano, P.4
  • 32
    • 84879843710 scopus 로고    scopus 로고
    • Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform
    • 10.1007/s11128-013-0561-5
    • Yang Y.-G., Jia X., Xu P., Tian J., Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Information Processing 2013 12 8 2765 2769 10.1007/s11128-013-0561-5
    • (2013) Quantum Information Processing , vol.12 , Issue.8 , pp. 2765-2769
    • Yang, Y.-G.1    Jia, X.2    Xu, P.3    Tian, J.4
  • 33
    • 84869383080 scopus 로고    scopus 로고
    • Application of binary image authentication algorithm in digital watermarking
    • Lecture Notes in Electrical Engineering 10.1007/978-3-642-34531-9-95
    • Wang C., Li H., Application of binary image authentication algorithm in digital watermarking. Proceedings of the International Conference on Information Technology and Software Engineering 2012 212 887 894 Lecture Notes in Electrical Engineering 10.1007/978-3-642-34531-9-95
    • (2012) Proceedings of the International Conference on Information Technology and Software Engineering , vol.212 , pp. 887-894
    • Wang, C.1    Li, H.2
  • 34
    • 84869417490 scopus 로고    scopus 로고
    • Semi-fragile water marking technique based on JPEG invariant and chaotic maps
    • Li Z. H., Hou J. J., Semi-fragile water marking technique based on JPEG invariant and chaotic maps Computer Engineering and Applications 2007 43 32 40 43
    • (2007) Computer Engineering and Applications , vol.43 , Issue.32 , pp. 40-43
    • Li, Z.H.1    Hou, J.J.2
  • 36
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • Wong P. W., Memon N., Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Transactions on Image Processing 2001 10 10 1593 1601 2-s2.0-0035473831 10.1109/83.951543 (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 37
  • 38
    • 69149091825 scopus 로고    scopus 로고
    • Robust and transparent watermarking scheme for colour images
    • 2-s2.0-69149091825 10.1049/iet-ipr.2008.0068
    • Liu K.-C., Chou C.-H., Robust and transparent watermarking scheme for colour images. IET Image Processing 2009 3 4 228 242 2-s2.0-69149091825 10.1049/iet-ipr.2008.0068
    • (2009) IET Image Processing , vol.3 , Issue.4 , pp. 228-242
    • Liu, K.-C.1    Chou, C.-H.2
  • 39
    • 78650098359 scopus 로고    scopus 로고
    • A blind digital watermark technique for color image wavelet transform and SIFT
    • Thorat C. G., Jadhav B. D., A blind digital watermark technique for color image wavelet transform and SIFT. Procedia Computer Science 2010 2 236 241
    • (2010) Procedia Computer Science , vol.2 , pp. 236-241
    • Thorat, C.G.1    Jadhav, B.D.2
  • 40
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • October Chicago, III, USA 2-s2.0-0032312612
    • Wong P. W., A public key watermark for image verification and authentication. 1 Proceedings of the International Conference on Image Processing (ICIP '98) October 1998 Chicago, III, USA 455 459 2-s2.0-0032312612
    • (1998) Proceedings of the International Conference on Image Processing (ICIP '98) , vol.1 , pp. 455-459
    • Wong, P.W.1
  • 42
    • 0034442403 scopus 로고    scopus 로고
    • Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
    • September Vancouver, Canada 2-s2.0-0034442403
    • Li C.-T., Lou D.-C., Chen T.-H., Image authentication and integrity verification via content-based watermarks and a public key cryptosystem. 3 Proceedings of the International Conference on Image Processing (ICIP '00) September 2000 Vancouver, Canada 694 697 2-s2.0-0034442403
    • (2000) Proceedings of the International Conference on Image Processing (ICIP '00) , vol.3 , pp. 694-697
    • Li, C.-T.1    Lou, D.-C.2    Chen, T.-H.3
  • 43
    • 0037721337 scopus 로고    scopus 로고
    • One-dimensional neighborhood forming strategy for fragile watermarking
    • 2-s2.0-0037721337 10.1117/1.1557156
    • Li C.-T., Yang F.-M., One-dimensional neighborhood forming strategy for fragile watermarking. Journal of Electronic Imaging 2003 12 2 284 291 2-s2.0-0037721337 10.1117/1.1557156
    • (2003) Journal of Electronic Imaging , vol.12 , Issue.2 , pp. 284-291
    • Li, C.-T.1    Yang, F.-M.2
  • 45
    • 79951747222 scopus 로고    scopus 로고
    • A new public-key oblivious fragile watermarking for image authentication using discrete cosine transform
    • Chang C.-C., Chou H., A new public-key oblivious fragile watermarking for image authentication using discrete cosine transform. International Journal of Signal Processing, Image Processing and Pattern 2009 2 1 133 140
    • (2009) International Journal of Signal Processing, Image Processing and Pattern , vol.2 , Issue.1 , pp. 133-140
    • Chang, C.-C.1    Chou, H.2
  • 48
    • 0035509773 scopus 로고    scopus 로고
    • A class of authentication digital watermarks for secure multimedia communication
    • DOI 10.1109/83.967402, PII S1057714901093629
    • Xie L., Arce G. R., A class of authentication digital watermarks for secure multimedia communication. IEEE Transactions on Image Processing 2001 10 11 1754 1764 2-s2.0-0035509773 10.1109/83.967402 (Pubitemid 33149058)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.11 , pp. 1754-1764
    • Xie, L.1    Arce, G.R.2
  • 50
    • 0035400742 scopus 로고    scopus 로고
    • Use of chaotic dynamical systems in cryptography
    • DOI 10.1016/S0016-0032(00)00087-9, PII S0016003200000879
    • Schmitz R., Use of chaotic dynamical systems in cryptography. Journal of the Franklin Institute 2001 338 4 429 441 2-s2.0-0035400742 10.1016/S0016- 0032(00)00087-9 (Pubitemid 32446618)
    • (2001) Journal of the Franklin Institute , vol.338 , Issue.4 , pp. 429-441
    • Schmitz, R.1
  • 51
    • 79960457002 scopus 로고    scopus 로고
    • A secure fragile watermarking scheme based on chaos-and-hamming code
    • 2-s2.0-79960457002 10.1016/j.jss.2011.02.029
    • Chang C.-C., Chen K.-N., Lee C.-F., Liu L.-J., A secure fragile watermarking scheme based on chaos-and-hamming code. Journal of Systems and Software 2011 84 9 1462 1470 2-s2.0-79960457002 10.1016/j.jss.2011.02.029
    • (2011) Journal of Systems and Software , vol.84 , Issue.9 , pp. 1462-1470
    • Chang, C.-C.1    Chen, K.-N.2    Lee, C.-F.3    Liu, L.-J.4
  • 52
    • 34547662251 scopus 로고    scopus 로고
    • Digital watermarking based on chaotic map and reference register
    • DOI 10.1016/j.patcog.2007.04.013, PII S0031320307001847
    • Wu Y.-T., Shih F. Y., Digital watermarking based on chaotic map and reference register. Pattern Recognition 2007 40 12 3753 3763 2-s2.0-34547662251 10.1016/j.patcog.2007.04.013 (Pubitemid 47223288)
    • (2007) Pattern Recognition , vol.40 , Issue.12 , pp. 3753-3763
    • Wu, Y.-T.1    Shih, F.Y.2
  • 53
    • 34247361264 scopus 로고    scopus 로고
    • A novel digital watermark algorithm based on chaotic maps
    • 2-s2.0-34247361264 10.1016/j.physleta.2007.01.034
    • Wu X., Guan Z.-H., A novel digital watermark algorithm based on chaotic maps. Physics Letters A 2007 365 5-6 403 406 2-s2.0-34247361264 10.1016/j.physleta.2007.01.034
    • (2007) Physics Letters A , vol.365 , Issue.5-6 , pp. 403-406
    • Wu, X.1    Guan, Z.-H.2
  • 54
    • 1842528982 scopus 로고    scopus 로고
    • A chaos-based robust wavelet-domain watermarking algorithm
    • 2-s2.0-1842528982 10.1016/j.chaos.2003.12.104
    • Dawei Z., Guanrong C., Wenbo L., A chaos-based robust wavelet-domain watermarking algorithm. Chaos, Solitons & Fractals 2004 22 1 47 54 2-s2.0-1842528982 10.1016/j.chaos.2003.12.104
    • (2004) Chaos, Solitons & Fractals , vol.22 , Issue.1 , pp. 47-54
    • Dawei, Z.1    Guanrong, C.2    Wenbo, L.3
  • 57
    • 1942436689 scopus 로고    scopus 로고
    • Image quality assessment: From error visibility to structural similarity
    • 2-s2.0-1942436689 10.1109/TIP.2003.819861
    • Wang Z., Bovik A. C., Sheikh H. R., Simoncelli E. P., Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 2004 13 4 600 612 2-s2.0-1942436689 10.1109/TIP.2003.819861
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.4 , pp. 600-612
    • Wang, Z.1    Bovik, A.C.2    Sheikh, H.R.3    Simoncelli, E.P.4
  • 58
    • 33846419477 scopus 로고    scopus 로고
    • Chaotic secure content-based hidden transmission of biometric templates
    • DOI 10.1016/j.chaos.2005.12.015, PII S0960077905012154
    • Khan M. K., Zhang J., Tian L., Chaotic secure content-based hidden transmission of biometric templates. Chaos, Solitons & Fractals 2007 32 5 1749 1759 2-s2.0-33846419477 10.1016/j.chaos.2005.12.015 (Pubitemid 46138161)
    • (2007) Chaos, Solitons and Fractals , vol.32 , Issue.5 , pp. 1749-1759
    • Khan, M.K.1    Zhang, J.2    Tian, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.