메뉴 건너뛰기




Volumn , Issue , 2002, Pages 225-229

Watermark in color image

Author keywords

digital watermark; spatial domain

Indexed keywords

DIGITAL WATERMARKING;

EID: 84961842073     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CW.2002.1180883     Document Type: Conference Paper
Times cited : (20)

References (6)
  • 2
    • 0032785523 scopus 로고    scopus 로고
    • Hidden Digital Watermarks in images
    • January
    • Chiou-Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in images", IEEE Transactions on Image Processing, Vol. 8, No 1, January 1999, pp.58-68.
    • (1999) IEEE Transactions on Image Processing , vol.8 , Issue.1 , pp. 58-68
    • Hsu, C.-T.1    Wu, J.-L.2
  • 3
    • 4344583179 scopus 로고    scopus 로고
    • Fast two-layer image watermarking without resorting to original image and watermark
    • Taiwan, Republic of China
    • J.C. Liu and S.Y. Chen, "Fast two-layer image watermarking without resorting to original image and watermark ", Proc. of joint Conference of International computer Symposium, pp. 231-238, Taiwan, Republic of China, 2000.
    • (2000) Proc. of Joint Conference of International Computer Symposium , pp. 231-238
    • Liu, J.C.1    Chen, S.Y.2
  • 4
    • 0001001980 scopus 로고    scopus 로고
    • Digital Signature of Color Images using Amplitude Modulation
    • April
    • Martin Kutter, Frederic Jordan, and Frank Bossen, "Digital Signature of Color Images using Amplitude Modulation", J. Electron. Imaging 7(2), April 1998, pp. 326-332.
    • (1998) J. Electron. Imaging , vol.7 , Issue.2 , pp. 326-332
    • Kutter, M.1    Jordan, F.2    Bossen, F.3
  • 6
    • 0242697129 scopus 로고    scopus 로고
    • An Adaptive Image Steganographic Model Based on Minimum-Error Replacement
    • May. 14-15, Taichung, Taiwan
    • Yeuan-Kuen Lee and Ling-Hwei Chen, "An Adaptive Image Steganographic Model Based on Minimum-Error Replacement", Proceedings of the Ninth National Conference on Information Security, May. 14-15, 1999, Taichung, Taiwan, pp. 8-15.
    • (1999) Proceedings of the Ninth National Conference on Information Security , pp. 8-15
    • Lee, Y.-K.1    Chen, L.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.