메뉴 건너뛰기




Volumn 21, Issue 2, 2004, Pages 40-49

When seeing isn't believing

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COSINE TRANSFORMS; CRYPTOGRAPHY; DIGITAL WATERMARKING; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FEATURE EXTRACTION; IMAGE ENHANCEMENT; IMAGE PROCESSING; IMAGE QUALITY; MULTIMEDIA SYSTEMS; VECTOR QUANTIZATION; WAVELET TRANSFORMS;

EID: 85032752228     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2004.1276112     Document Type: Article
Times cited : (172)

References (33)
  • 2
    • 8644240462 scopus 로고    scopus 로고
    • Multimedia authentication and watermarking
    • D. Feng, W. C. Siu, and H. Zhang, Eds, Springer-Verlag; ch. 7
    • B.B. Zhu and M.D. Swanson, "Multimedia authentication and watermarking," Multimedia Information Retrieval and Management, D. Feng, W. C. Siu, and H. Zhang, Eds, Springer-Verlag, 2003, ch. 7, pp. 148-177.
    • (2003) Multimedia Information Retrieval and Management , pp. 148-177
    • Zhu, B.B.1    Swanson, M.D.2
  • 3
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes," IEEE Trans. Image Processing, vol. 9, no. 3, pp. 432-441, 2000.
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 9
    • 0029292158 scopus 로고
    • Information authentication for a slippery new age
    • S. Walton, "Information authentication for a slippery new age," Dr. Dobbs J., vol. 20, no. 4, pp. 18-26, 1995.
    • (1995) Dr. Dobbs J. , vol.20 , Issue.4 , pp. 18-26
    • Walton, S.1
  • 10
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • P.W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE. Trans. Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001.
    • (2001) IEEE. Trans. Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 18
    • 16544389965 scopus 로고    scopus 로고
    • Coding and data hiding for multimedia
    • Ph. D. dissertation, Dept. of Electrical and Computer Engineering, Univ. of Minnesota, Twin Cities, MN, Dec.
    • B. Zhu, "Coding and data hiding for multimedia," Ph. D. dissertation, Dept. of Electrical and Computer Engineering, Univ. of Minnesota, Twin Cities, MN, Dec. 1998.
    • (1998)
    • Zhu, B.1
  • 19
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • D. Kundur and D. Hatzinako, "Digital watermarking for telltale tamper proofing and authentication," Proc. IEEE, vol. 87, no. 7, pp. 1167-1180, 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1167-1180
    • Kundur, D.1    Hatzinako, D.2
  • 21
    • 0036755019 scopus 로고    scopus 로고
    • On the design of content-based multimedia authentication systems
    • Sept.
    • C.W. Wu, "On the design of content-based multimedia authentication systems," IEEE Trans. Multimedia, vol. 4, pp. 385-393, Sept. 2002.
    • (2002) IEEE Trans. Multimedia , vol.4 , pp. 385-393
    • Wu, C.W.1
  • 23
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • D.-C. Lou and J.-L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 31-39, 2000.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , Issue.1 , pp. 31-39
    • Lou, D.-C.1    Liu, J.-L.2
  • 26
    • 0034442403 scopus 로고    scopus 로고
    • Image authentication and integrity verification via content-based watermarks and a public key cryptosystem
    • C.-T. Li, D.-C. Lou, and T.-H. Chen, "Image authentication and integrity verification via content-based watermarks and a public key cryptosystem," in Proc. IEEE Int. Conf. Image Processing, 2000, vol. 3, pp. 694-697.
    • Proc. IEEE Int. Conf. Image Processing, 2000 , vol.3 , pp. 694-697
    • Li, C.-T.1    Lou, D.-C.2    Chen, T.-H.3
  • 28
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 153-168, 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.