메뉴 건너뛰기




Volumn , Issue , 2017, Pages 1-180

Digital watermarking and steganography: Fundamentals and techniques

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL STORAGE; FREQUENCY DOMAIN ANALYSIS; MULTIMEDIA SYSTEMS; STEGANOGRAPHY;

EID: 85052467963     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781315219783     Document Type: Book
Times cited : (132)

References (207)
  • 1
    • 85008047913 scopus 로고    scopus 로고
    • Protecting Ownership Rights through Digital Watermarking
    • Berghel, H., and L. O’Gorman. “Protecting Ownership Rights through Digital Watermarking.” IEEE Computer Mag. 29 (1996): 101.
    • (1996) IEEE Computer Mag. , vol.29 , pp. 101
    • Berghel, H.1    O’Gorman, L.2
  • 2
    • 85052475021 scopus 로고    scopus 로고
    • Capacity of the Watermark Channel: How Many Bits Can Be Hidden within a Digital Image?
    • ed. P. W. Wong and E. J. Delp III. Proc. SPIE 2657, San Jose, CA: SPIE
    • Barni, M., F. Bartolini, A. De Rosa, and A. Piva. “Capacity of the Watermark Channel: How Many Bits Can Be Hidden within a Digital Image?" In Security and Watermarking of Multimedia Contents, ed. P. W. Wong and E. J. Delp III. Proc. SPIE 2657, San Jose, CA: SPIE, 1999.
    • (1999) Security and Watermarking of Multimedia Contents
    • Barni, M.1    Bartolini, F.2    De Rosa, A.3    Piva, A.4
  • 3
    • 0036556071 scopus 로고    scopus 로고
    • Combinational Image Watermarking in the Spatial and Frequency Domains
    • Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
    • (2003) Pattern Recognition , vol.36 , pp. 969
    • Shih, F.Y.1    Wu, S.Y.2
  • 4
    • 0030388964 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Images Audio and Video
    • Lausanne, Switzerland: IEEE
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Images Audio and Video.” In Proc. IEEE Int. Conf. Image Processing. Lausanne, Switzerland: IEEE, 1996.
    • (1996) Proc. IEEE Int. Conf. Image Processing.
    • Cox, I.1
  • 5
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.1
  • 6
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 7
    • 0032075445 scopus 로고    scopus 로고
    • Robust Image Watermarking in the Spatial Domain
    • Nikolaidis, N., and I. Pitas. “Robust Image Watermarking in the Spatial Domain.” Signal Processing 66 (1998): 385.
    • (1998) Signal Processing , vol.66 , pp. 385
    • Nikolaidis, N.1    Pitas, I.2
  • 8
    • 0035605834 scopus 로고    scopus 로고
    • Compact Storage of Medical Image with Patient Information
    • Acharya, U. R., et al. “Compact Storage of Medical Image with Patient Information.” IEEE Trans. Info. Tech. in Biomedicine 5 (2001): 320.
    • (2001) IEEE Trans. Info. Tech. in Biomedicine , vol.5 , pp. 320
    • Acharya, U.R.1
  • 9
    • 0002152920 scopus 로고
    • Assuring Ownership Rights for Digital Images
    • Germany: Viewveg
    • Caronni, G. “Assuring Ownership Rights for Digital Images.” In Proc. Reliable IT Systems, Germany: Viewveg, 1995.
    • (1995) Proc. Reliable IT Systems
    • Caronni, G.1
  • 10
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical Watermarking for Secure Image Authentication with Localization
    • Celik, M. et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
    • (2002) IEEE Trans. Image Processing , vol.11 , pp. 585
    • Celik, M.1
  • 13
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Chicago
    • Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing, Chicago, 1998.
    • (1998) Proc. IEEE Int. Conf. Image Processing
    • Wong, P.W.1
  • 14
    • 0034266804 scopus 로고    scopus 로고
    • Watermarking Digital Image and Video Data: A State-of-the-Art Overview
    • Langelaar, G., et al. “Watermarking Digital Image and Video Data: A State-of-the-Art Overview.” IEEE Signal Processing 17 (2000): 20.
    • (2000) IEEE Signal Processing , vol.17 , pp. 20
    • Langelaar, G.1
  • 15
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I. J., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.J.1
  • 17
    • 0036488363 scopus 로고    scopus 로고
    • The First 50 Years of Electronic Watermarking
    • Cox, I., and M. Miller. “The First 50 Years of Electronic Watermarking.” J. Appl. Signal Processing 2 (2002): 126.
    • (2002) J. Appl. Signal Processing , vol.2 , pp. 126
    • Cox, I.1    Miller, M.2
  • 20
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 23
    • 0001849187 scopus 로고    scopus 로고
    • Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned
    • Dresden, Germany
    • Westfeld, A., and A. Pfitzmann. “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned.” In Proc. Int. Workshop Information Hiding, Dresden, Germany, 1999, 61.
    • (1999) Proc. Int. Workshop Information Hiding , pp. 61
    • Westfeld, A.1    Pfitzmann, A.2
  • 24
  • 25
    • 0242497150 scopus 로고    scopus 로고
    • New Methodology for Breaking Steganographic Techniques for JPEGs
    • Santa Clara, CA: SPIE
    • Fridrich, J., M. Goljan, and D. Hogea. “New Methodology for Breaking Steganographic Techniques for JPEGs.” In Proc. SPIE, Santa Clara, CA: SPIE, 2003.
    • (2003) Proc. SPIE
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 27
    • 0032072250 scopus 로고    scopus 로고
    • A DCT-Domain System for Robust Image Watermarking
    • Barni, M., et al. “A DCT-Domain System for Robust Image Watermarking.” Signal Processing 66 (1998): 357.
    • (1998) Signal Processing , vol.66 , pp. 357
    • Barni, M.1
  • 28
    • 0032075445 scopus 로고    scopus 로고
    • Robust Image Watermarking in the Spatial Domain
    • Nikolaidis, N., and I. Pitas. “Robust Image Watermarking in the Spatial Domain.” Signal Processing 66 (1998): 385.
    • (1998) Signal Processing , vol.66 , pp. 385
    • Nikolaidis, N.1    Pitas, I.2
  • 29
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I. J., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing, 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.J.1
  • 31
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 32
    • 0042823352 scopus 로고    scopus 로고
    • Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack
    • Deguillaume, F., S. Voloshynovskiy, and T. Pun. “Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack.” Signal Processing 83 (2003): 2133.
    • (2003) Signal Processing , vol.83 , pp. 2133
    • Deguillaume, F.1    Voloshynovskiy, S.2    Pun, T.3
  • 33
    • 0036448095 scopus 로고    scopus 로고
    • Semifragile Image Authentication Using Generic Wavelet Domain Features and ECC
    • Sun, Q., and S.-F. Chang. “Semifragile Image Authentication Using Generic Wavelet Domain Features and ECC.” In Proc. IEEE Int. Conf. on Image Processing. 2002.
    • (2002) Proc. IEEE Int. Conf. on Image Processing.
    • Sun, Q.1    Chang, S.-F.2
  • 34
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Chicago
    • Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
    • (1998) Proc. IEEE Int. Conf. Image Processing.
    • Wong, P.W.1
  • 35
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical Watermarking for Secure Image Authentication with Localization
    • Celik, M. U., et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
    • (2002) IEEE Trans. Image Processing , vol.11 , pp. 585
    • Celik, M.U.1
  • 38
    • 0002152920 scopus 로고
    • Assuring Ownership Rights for Digital Images
    • Germany: Viewveg
    • Caronni, G. “Assuring Ownership Rights for Digital Images.” In Proc. Reliable IT Systems. Germany: Viewveg, 1995.
    • (1995) Proc. Reliable IT Systems.
    • Caronni, G.1
  • 39
    • 85008047913 scopus 로고    scopus 로고
    • Protecting Ownership Rights through Digital Watermarking
    • Berghel, H., and L. O’Gorman. “Protecting Ownership Rights through Digital Watermarking.” IEEE Computer Mag. 29 (1996): 101.
    • (1996) IEEE Computer Mag. , vol.29 , pp. 101
    • Berghel, H.1    O’Gorman, L.2
  • 40
    • 0030388964 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Images Audio and Video
    • Lausanne, Switzerland: IEEE
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Images Audio and Video.” In Proc. IEEE Int. Conf. Image Processing. Lausanne, Switzerland: IEEE, 1996.
    • (1996) Proc. IEEE Int. Conf. Image Processing.
    • Cox, I.1
  • 42
    • 0031996445 scopus 로고    scopus 로고
    • Exploring Steganography: Seeing the Unseen
    • Johnson, N., and S. Jajodia, S. “Exploring Steganography: Seeing the Unseen.” IEEE Computer 31 (1998): 26.
    • (1998) IEEE Computer , vol.31 , pp. 26
    • Johnson, N.1    Jajodia, S.S.2
  • 45
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 46
    • 0032072439 scopus 로고    scopus 로고
    • Forward and Inverse Transformations between Haar Wavelet and Arithmetic Functions
    • Falkowski, B. J. “Forward and Inverse Transformations between Haar Wavelet and Arithmetic Functions.” Electronics Letters 34 (1998): 1084.
    • (1998) Electronics Letters , vol.34 , pp. 1084
    • Falkowski, B.J.1
  • 47
    • 0026743540 scopus 로고
    • Multiresolution Analysis, Haar Bases, and Self-Similar Tilings of Rn
    • Grochenig, K., and W. R. Madych. “Multiresolution Analysis, Haar Bases, and Self-Similar Tilings of Rn.” IEEE Trans. Information Theory 38 (1992): 556.
    • (1992) IEEE Trans. Information Theory , vol.38 , pp. 556
    • Grochenig, K.1    Madych, W.R.2
  • 50
    • 1842528982 scopus 로고    scopus 로고
    • A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm
    • Zhao, D., G. Chen, and W. Liu. “A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm.” Chaos, Solitons and Fractals 22 (2004): 47.
    • (2004) Chaos, Solitons and Fractals , vol.22 , pp. 47
    • Zhao, D.1    Chen, G.2    Liu, W.3
  • 51
    • 0035400742 scopus 로고    scopus 로고
    • Use of Chaotic Dynamical Systems in Cryptography
    • Schmitz, R. “Use of Chaotic Dynamical Systems in Cryptography.” J. Franklin Institute 338 (2001): 429.
    • (2001) J. Franklin Institute , vol.338 , pp. 429
    • Schmitz, R.1
  • 54
    • 0030173121 scopus 로고    scopus 로고
    • A New, Fast, and Efficient Image Code Based on Set Partitioning in Hierarchical Trees
    • Said, A., and W. A. Pearlman. “A New, Fast, and Efficient Image Code Based on Set Partitioning in Hierarchical Trees.” IEEE Trans. Circuits and Systems for Video Technology 6 (1996): 243.
    • (1996) IEEE Trans. Circuits and Systems for Video Technology , vol.6 , pp. 243
    • Said, A.1    Pearlman, W.A.2
  • 55
    • 0027798110 scopus 로고
    • Embedded Image Coding Using Zerotrees of Wavelet Coefficients
    • Shapiro, J. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients.” IEEE Trans. Signal Processing 41 (1993): 3445.
    • (1993) IEEE Trans. Signal Processing , vol.41 , pp. 3445
    • Shapiro, J.1
  • 56
    • 0035391983 scopus 로고    scopus 로고
    • Digital Watermarking: Algorithms and Applications
    • Podilchuk, C. I., and E. J. Delp. “Digital Watermarking: Algorithms and Applications.” IEEE Signal Processing Mag. 18 (2001): 33.
    • (2001) IEEE Signal Processing Mag. , vol.18 , pp. 33
    • Podilchuk, C.I.1    Delp, E.J.2
  • 59
    • 0036556071 scopus 로고    scopus 로고
    • Combinational Image Watermarking in the Spatial and Frequency Domains
    • Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
    • (2003) Pattern Recognition , vol.36 , pp. 969
    • Shih, F.Y.1    Wu, S.Y.2
  • 60
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Chicago
    • Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
    • (1998) Proc. IEEE Int. Conf. Image Processing.
    • Wong, P.W.1
  • 63
    • 0742321328 scopus 로고    scopus 로고
    • Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication
    • Mukherjee, D., S. Maitra, and S. Acton. “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication.” IEEE Trans. on Multimedia 6 (2004): 1.
    • (2004) IEEE Trans. on Multimedia , vol.6 , pp. 1
    • Mukherjee, D.1    Maitra, S.2    Acton, S.3
  • 64
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 66
    • 0001553281 scopus 로고    scopus 로고
    • A Secure, Robust Watermark for Multimedia
    • Cambridge, UK
    • Cox, J., et al. “A Secure, Robust Watermark for Multimedia.” In Proc. First Int. Workshop Information Hiding. Cambridge, UK, 1996, 185.
    • (1996) Proc. First Int. Workshop Information Hiding. , pp. 185
    • Cox, J.1
  • 67
    • 0021412027 scopus 로고
    • Vector Quantization
    • Gray, R. M. “Vector Quantization.” IEEE ASSP Mag. 1 (1984): 4.
    • (1984) IEEE ASSP Mag. , vol.1 , pp. 4
    • Gray, R.M.1
  • 68
    • 0033907535 scopus 로고    scopus 로고
    • Digital Image Watermarking Technique Based on Vector Quantization
    • Lu, Z., and S. Sun. “Digital Image Watermarking Technique Based on Vector Quantization.” IEEE Electronics Letters 36 (2000): 303.
    • (2000) IEEE Electronics Letters , vol.36 , pp. 303
    • Lu, Z.1    Sun, S.2
  • 69
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Chicago
    • Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
    • (1998) Proc. IEEE Int. Conf. Image Processing.
    • Wong, P.W.1
  • 70
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R., A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (1978): 120.
    • (1978) Communications of the ACM , vol.21 , pp. 120
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 71
    • 0003602325 scopus 로고
    • RFC 1321. Cambridge, MA: MIT Laboratory for Computer Science/RSA Data Security
    • Rivest, R. L. The MD5 Message Digest Algorithm. RFC 1321. Cambridge, MA: MIT Laboratory for Computer Science/RSA Data Security 1992.
    • (1992) The MD5 Message Digest Algorithm.
    • Rivest, R.L.1
  • 72
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes
    • Holliman, M., and N. Memon. Counterfeiting Attacks on Oblivious Block-Wise Independent Invisible Watermarking Schemes. IEEE Trans. Image Processing 9 (2000): 432.
    • (2000) IEEE Trans. Image Processing , vol.9 , pp. 432
    • Holliman, M.1    Memon, N.2
  • 73
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical Watermarking for Secure Image Authentication with Localization
    • Celik, M., et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
    • (2002) IEEE Trans. Image Processing , vol.11 , pp. 585
    • Celik, M.1
  • 74
    • 85052442424 scopus 로고    scopus 로고
    • Copyright Protection for Cultureware Preservation in Digital Repositories
    • Yokohama, Japan
    • Coetzee, L., and J. Eksteen. “Copyright Protection for Cultureware Preservation in Digital Repositories.” In Proc. 10th Annual Internet Society Conference. Yokohama, Japan, 2000.
    • (2000) Proc. 10th Annual Internet Society Conference.
    • Coetzee, L.1    Eksteen, J.2
  • 76
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I. J., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.J.1
  • 77
    • 60349127871 scopus 로고    scopus 로고
    • Digital Watermarking
    • Cox, I. J., et al. “Digital Watermarking.” J. Electronic Imaging 11 (2002): 414.
    • (2002) J. Electronic Imaging , vol.11 , pp. 414
    • Cox, I.J.1
  • 79
    • 0035485860 scopus 로고    scopus 로고
    • Diversity and Attack Characterization for Improved Robust Watermarking
    • Kundur, D., and D. Hatzinakos. “Diversity and Attack Characterization for Improved Robust Watermarking.” IEEE Trans. Signal Processing 29 (2001): 2383.
    • (2001) IEEE Trans. Signal Processing , vol.29 , pp. 2383
    • Kundur, D.1    Hatzinakos, D.2
  • 82
    • 0031365813 scopus 로고    scopus 로고
    • Rotation, Translation and Scale Invariant Digital Image Watermarking
    • O’Ruanaidh, J., and T. Pun. Rotation, Translation and Scale Invariant Digital Image Watermarking.” In Proc. Int. Conf. Image Processing. 1997, 536.
    • (1997) Proc. Int. Conf. Image Processing. , pp. 536
    • O’Ruanaidh, J.1    Pun, T.2
  • 85
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting Attacks for Block-Wise Independent Watermarking Techniques
    • Holliman, M., and N. Memon. “Counterfeiting Attacks for Block-Wise Independent Watermarking Techniques.” IEEE Trans. Image Processing 9 (2000): 432.
    • (2000) IEEE Trans. Image Processing , vol.9 , pp. 432
    • Holliman, M.1    Memon, N.2
  • 86
    • 0002329325 scopus 로고    scopus 로고
    • Template-Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps
    • Florence, Italy
    • Pereira, S., et al. “Template-Based Recovery of Fourier-Based Watermarks Using Log-Polar and Log-Log Maps.” In Proc. IEEE Int. Conf. Multimedia Computing and Systems. Florence, Italy, 1999.
    • (1999) Proc. IEEE Int. Conf. Multimedia Computing and Systems.
    • Pereira, S.1
  • 87
    • 0000964065 scopus 로고    scopus 로고
    • Analysis of the Sensitivity Attack against Electronic Watermarks in Images
    • Portland, OR
    • Linnartz, J., and M. Dijk, M. “Analysis of the Sensitivity Attack against Electronic Watermarks in Images.” In Proc. Intl. Workshop on Information Hiding. Portland, OR, 1998.
    • (1998) Proc. Intl. Workshop on Information Hiding.
    • Linnartz, J.1    Dijk, M.M.2
  • 88
    • 0042823352 scopus 로고    scopus 로고
    • Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack
    • Deguillaume, F., et al. “Secure Hybrid Robust Watermarking Resistant against Tampering and Copy Attack.” Signal Processing 83 (2003): 2133.
    • (2003) Signal Processing , vol.83 , pp. 2133
    • Deguillaume, F.1
  • 90
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking Schemes Evaluation
    • Petitcolas, F. “Watermarking Schemes Evaluation.” IEEE Signal Processing 17 (2000): 58.
    • (2000) IEEE Signal Processing , vol.17 , pp. 58
    • Petitcolas, F.1
  • 91
    • 0035369792 scopus 로고    scopus 로고
    • Attack Modelling: Towards a Second Generation Benchmark
    • Voloshynovskiy, S., et al. “Attack Modelling: Towards a Second Generation Benchmark.” Signal Processing 81 (2001): 1177.
    • (2001) Signal Processing , vol.81 , pp. 1177
    • Voloshynovskiy, S.1
  • 92
    • 0003197599 scopus 로고    scopus 로고
    • Second Generation Benchmarking and Application Oriented Evaluation
    • Pittsburgh, PA
    • Pereira, S., et al. “Second Generation Benchmarking and Application Oriented Evaluation.” In Proc. Information Hiding Workshop III. Pittsburgh, PA, 2001.
    • (2001) Proc. Information Hiding Workshop III.
    • Pereira, S.1
  • 93
    • 0035159385 scopus 로고    scopus 로고
    • A Benchmarking Protocol for Watermarking Methods
    • Thessaloniki, Greece
    • Solachidis, V., et al. “A Benchmarking Protocol for Watermarking Methods.” In Proc. IEEE Int. Conf. on Image Processing. Thessaloniki, Greece, 2001.
    • (2001) Proc. IEEE Int. Conf. on Image Processing.
    • Solachidis, V.1
  • 96
    • 0002152920 scopus 로고
    • Assuring Ownership Rights for Digital Images
    • Germany: Viewveg
    • Caronni, G. “Assuring Ownership Rights for Digital Images.” In Proc. Reliable IT Systems. Germany: Viewveg, 1995.
    • (1995) Proc. Reliable IT Systems.
    • Caronni, G.1
  • 98
    • 0030388964 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Images, Audio, and Video
    • Lausanne, Switzerland: IEEE
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Images, Audio, and Video.” In Proc. IEEE Int. Conf. Image Processing. Lausanne, Switzerland: IEEE, 1996.
    • (1996) Proc. IEEE Int. Conf. Image Processing.
    • Cox, I.1
  • 99
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.1
  • 100
    • 0035294752 scopus 로고    scopus 로고
    • Image Watermarking: An Evolution to Content Based Approaches
    • Bas, P., J.-M. Chassery, and B. Macq. “Image Watermarking: An Evolution to Content Based Approaches.” Pattern Recognition 35 (2002): 545.
    • (2002) Pattern Recognition , vol.35 , pp. 545
    • Bas, P.1    Chassery, J.-M.2    Macq, B.3
  • 102
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 103
    • 0036556071 scopus 로고    scopus 로고
    • Combinational Image Watermarking in the Spatial and Frequency Domains
    • Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
    • (2003) Pattern Recognition , vol.36 , pp. 969
    • Shih, F.Y.1    Wu, S.Y.2
  • 104
    • 0034140111 scopus 로고    scopus 로고
    • Joint Wavelet and Spatial Transformation for Digital Watermarking
    • Tsai, M. J., K. Y. Yu, and Y. Z. Chen. “Joint Wavelet and Spatial Transformation for Digital Watermarking.” IEEE Trans. Consumer Electronics 46 (2000): 241.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 241
    • Tsai, M.J.1    Yu, K.Y.2    Chen, Y.Z.3
  • 105
    • 77956566515 scopus 로고    scopus 로고
    • A Robust Video Watermarking Technique for Compression and Transcoding Processing
    • Lausanne: Switzerland
    • Lancini, R., F. Mapelli, and S. Tubaro. “A Robust Video Watermarking Technique for Compression and Transcoding Processing.” In Proc. IEEE Int. Conf. Multimedia and Expo. Lausanne: Switzerland, 2002.
    • (2002) Proc. IEEE Int. Conf. Multimedia and Expo.
    • Lancini, R.1    Mapelli, F.2    Tubaro, S.3
  • 107
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R., A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (1978): 120.
    • (1978) Communications of the ACM , vol.21 , pp. 120
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 108
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 111
  • 112
    • 0031997283 scopus 로고    scopus 로고
    • Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms
    • Tang, K.-S., et al. “Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms.” IEEE Trans. Industrial Electronics 45 (1998): 162.
    • (1998) IEEE Trans. Industrial Electronics , vol.45 , pp. 162
    • Tang, K.-S.1
  • 114
    • 84948707475 scopus 로고    scopus 로고
    • Digital Watermarking for ROI Medical Images by Using Compressed Signature Image
    • Kona, HI
    • Wakatani, A. “Digital Watermarking for ROI Medical Images by Using Compressed Signature Image.” In Proc. Int. Conf. on System Sciences. Kona, HI, 2002.
    • (2002) Proc. Int. Conf. on System Sciences.
    • Wakatani, A.1
  • 115
    • 0031150291 scopus 로고    scopus 로고
    • Medical Image Compression with Lossless Regions of Interest
    • Strom, J., and P. C. Cosman. “Medical Image Compression with Lossless Regions of Interest.” Signal Processing 59 (1997): 155.
    • (1997) Signal Processing , vol.59 , pp. 155
    • Strom, J.1    Cosman, P.C.2
  • 116
    • 0030173121 scopus 로고    scopus 로고
    • A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees
    • Said, A., and W. A. Pearlmana. “A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees.” IEEE Trans. Circuits and System for Video Technology 6 (1997): 243.
    • (1997) IEEE Trans. Circuits and System for Video Technology , vol.6 , pp. 243
    • Said, A.1    Pearlmana, W.A.2
  • 117
    • 0027798110 scopus 로고
    • Embedded Image Coding Using Zerotrees of Wavelet Coefficients
    • Shapiro, J. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients.” IEEE Trans. Signal Processing 41 (1993): 3445.
    • (1993) IEEE Trans. Signal Processing , vol.41 , pp. 3445
    • Shapiro, J.1
  • 118
    • 0035605834 scopus 로고    scopus 로고
    • Compact Storage of Medical Image with Patient Information
    • Acharya, U. R., et al. “Compact Storage of Medical Image with Patient Information.” IEEE Trans. Info. Tech. in Biomedicine 5 (2001): 320.
    • (2001) IEEE Trans. Info. Tech. in Biomedicine , vol.5 , pp. 320
    • Acharya, U.R.1
  • 119
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.1
  • 120
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Chicago
    • Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
    • (1998) Proc. IEEE Int. Conf. Image Processing.
    • Wong, P.W.1
  • 121
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R., A. Shamir, and L. Adleman. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM 21 (1978): 120.
    • (1978) Communications of the ACM , vol.21 , pp. 120
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 123
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical Watermarking for Secure Image Authentication with Localization
    • Celik, M. U., et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
    • (2002) IEEE Trans. Image Processing , vol.11 , pp. 585
    • Celik, M.U.1
  • 124
    • 0038391442 scopus 로고    scopus 로고
    • Mean Quantization Based Image Watermarking
    • Chen, L.-H., and J.-J. Lin. “Mean Quantization Based Image Watermarking.” Image Vision Computing 21 (2003): 717.
    • (2003) Image Vision Computing , vol.21 , pp. 717
    • Chen, L.-H.1    Lin, J.-J.2
  • 127
    • 0024479011 scopus 로고
    • Threshold Decomposition of Grayscale Morphology into Binary Morphology
    • Shih, F. Y. and O. R. Mitchell. “Threshold Decomposition of Grayscale Morphology into Binary Morphology, IEEE Trans. Pattern Anal. Mach. Intell. 11 (1989): 31.
    • (1989) IEEE Trans. Pattern Anal. Mach. Intell. , vol.11 , pp. 31
    • Shih, F.Y.1    Mitchell, O.R.2
  • 128
    • 85008047913 scopus 로고    scopus 로고
    • Protecting Ownership Rights through Digital Watermarking
    • Berghel, H., and L. O’Gorman. “Protecting Ownership Rights through Digital Watermarking.” IEEE Computer Mag. 29 (1996): 101.
    • (1996) IEEE Computer Mag. , vol.29 , pp. 101
    • Berghel, H.1    O’Gorman, L.2
  • 131
    • 0032075445 scopus 로고    scopus 로고
    • Robust Image Watermarking in the Spatial Domain
    • Nikolaidis, N., and I. Pitas. “Robust Image Watermarking in the Spatial Domain.” Signal Processing 66 (1998): 385.
    • (1998) Signal Processing , vol.66 , pp. 385
    • Nikolaidis, N.1    Pitas, I.2
  • 132
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical Watermarking for Secure Image Authentication with Localization
    • Celik, M. et al. “Hierarchical Watermarking for Secure Image Authentication with Localization.” IEEE Trans. Image Processing 11 (2002): 585.
    • (2002) IEEE Trans. Image Processing , vol.11 , pp. 585
    • Celik, M.1
  • 133
    • 0030386584 scopus 로고    scopus 로고
    • Applications of Toral Automorphisms in Image Watermarking
    • Lausanne, Switzerland: IEEE
    • Voyatzis, G., and I. Pitas. “Applications of Toral Automorphisms in Image Watermarking.” In Proc. IEEE Int. Conf. on Image Processing. Lausanne, Switzerland: IEEE, 1996.
    • (1996) Proc. IEEE Int. Conf. on Image Processing.
    • Voyatzis, G.1    Pitas, I.2
  • 134
    • 0742321328 scopus 로고    scopus 로고
    • Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication
    • Mukherjee, D., S. Maitra, and S. Acton. “Spatial Domain Digital Watermarking of Multimedia Objects for Buyer Authentication.” IEEE Trans. on Multimedia 6 (2004): 1.
    • (2004) IEEE Trans. on Multimedia , vol.6 , pp. 1
    • Mukherjee, D.1    Maitra, S.2    Acton, S.3
  • 135
    • 0032312612 scopus 로고    scopus 로고
    • A Public Key Watermark for Image Verification and Authentication
    • Chicago
    • Wong, P. W. “A Public Key Watermark for Image Verification and Authentication.” In Proc. IEEE Int. Conf. Image Processing. Chicago, 1998.
    • (1998) Proc. IEEE Int. Conf. Image Processing.
    • Wong, P.W.1
  • 136
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.1
  • 137
    • 1842528982 scopus 로고    scopus 로고
    • A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm
    • Zhao, D., G. Chen, and W. Liu. “A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm.” Chaos, Solitons and Fractals 22 (2004): 47.
    • (2004) Chaos, Solitons and Fractals , vol.22 , pp. 47
    • Zhao, D.1    Chen, G.2    Liu, W.3
  • 138
    • 2942568431 scopus 로고    scopus 로고
    • Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark
    • Miller, M. L., G. J. Doerr, and I. J. Cox. “Applying Informed Coding and Embedding to Design a Robust High-Capacity Watermark.” IEEE Trans. Image Processing 13 (2004): 792.
    • (2004) IEEE Trans. Image Processing , vol.13 , pp. 792
    • Miller, M.L.1    Doerr, G.J.2    Cox, I.J.3
  • 139
    • 12344332735 scopus 로고    scopus 로고
    • An Adjusted-Purpose Digital Watermarking Technique
    • Wu, Y. T., and Shih, F. Y. “An Adjusted-Purpose Digital Watermarking Technique.” Pattern Recognition 37 (2004): 2349.
    • (2004) Pattern Recognition , vol.37 , pp. 2349
    • Wu, Y.T.1    Shih, F.Y.2
  • 140
    • 10444270831 scopus 로고    scopus 로고
    • Enhancement of Image Watermark Retrieval Based on Genetic Algorithm
    • Shih, F. Y., and Y. Wu. “Enhancement of Image Watermark Retrieval Based on Genetic Algorithm.” J. Visual Communication and Image Representation 16 (2005): 115.
    • (2005) J. Visual Communication and Image Representation , vol.16 , pp. 115
    • Shih, F.Y.1    Wu, Y.2
  • 141
    • 0034249378 scopus 로고    scopus 로고
    • A Robust DCT-Based Watermarking for Copyright Protection
    • Lin, S. D., and C.-F. Chen. “A Robust DCT-Based Watermarking for Copyright Protection.” IEEE Trans. Consumer Electronics 46 (2000): 415-.
    • (2000) IEEE Trans. Consumer Electronics , vol.46 , pp. 415
    • Lin, S.D.1    Chen, C.-F.2
  • 142
    • 31744433507 scopus 로고    scopus 로고
    • Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems
    • Wu, Y. T., and F. Y. Shih. “Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems.” IEEE Trans. Systems, Man, and Cybernetics, part B, 36 (2006): 24.
    • (2006) IEEE Trans. Systems, Man, and Cybernetics , vol.36 , pp. 24
    • Wu, Y.T.1    Shih, F.Y.2
  • 143
    • 0036556071 scopus 로고    scopus 로고
    • Combinational Image Watermarking in the Spatial and Frequency Domains
    • Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
    • (2003) Pattern Recognition , vol.36 , pp. 969
    • Shih, F.Y.1    Wu, S.Y.2
  • 149
    • 33744728031 scopus 로고    scopus 로고
    • Steganalysis for Markov Cover Data with Applications to Images
    • Sullivan, K., et al. “Steganalysis for Markov Cover Data with Applications to Images.” IEEE Trans. Information Forensics and Security 1 (2006): 275.
    • (2006) IEEE Trans. Information Forensics and Security , vol.1 , pp. 275
    • Sullivan, K.1
  • 150
    • 0031996445 scopus 로고    scopus 로고
    • Exploring Steganography: Seeing the Unseen
    • Johnson, N., and S. Jajodia, S. “Exploring Steganography: Seeing the Unseen.” IEEE Computer 31, (1998): 26.
    • (1998) IEEE Computer , vol.31 , pp. 26
    • Johnson, N.1    Jajodia, S.S.2
  • 153
    • 31744433507 scopus 로고    scopus 로고
    • Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems
    • Wu, Y. T., and F. Y. Shih. “Genetic Algorithm Based Methodology for Breaking the Steganalytic Systems.” IEEE Trans. Systems, Man, and Cybernetics, part B, 36 (2006): 24.
    • (2006) IEEE Trans. Systems, Man, and Cybernetics , vol.36 , pp. 24
    • Wu, Y.T.1    Shih, F.Y.2
  • 154
    • 85052468080 scopus 로고    scopus 로고
    • Shareware application, Available online at
    • Brown, A. S-Tools for Windows. Shareware application, 1994. Available online at ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip.
    • (1994) S-Tools for Windows.
    • Brown, A.1
  • 155
    • 85052455887 scopus 로고    scopus 로고
    • v0.90B, public domain. Available online at
    • Wolf, B. StegoDos-Black Wolf’s Picture Encoder v0.90B, public domain. Available online at ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip.
    • StegoDos-Black Wolf’s Picture Encoder
    • Wolf, B.1
  • 156
    • 85052457624 scopus 로고    scopus 로고
    • Jsteg Shell 2.0. Application. Available online at
    • Korejwa, J. Jsteg Shell 2.0. Application. Available online at http://www.tiac.net/users/korejwa/steg.htm.
    • Korejwa, J.1
  • 157
    • 0001849187 scopus 로고    scopus 로고
    • Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned
    • Dresden, Germany
    • Westfeld, A., and A. Pfitzmann. “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned.” In Proc. Int. Workshop Information Hiding. Dresden, Germany, 1999, 61.
    • (1999) Proc. Int. Workshop Information Hiding. , vol.61
    • Westfeld, A.1    Pfitzmann, A.2
  • 159
    • 0242497150 scopus 로고    scopus 로고
    • New Methodology for Breaking Steganographic Techniques for JPEGs
    • Santa Clara, CA: SPIE
    • Fridrich, J., M. Goljan, and D. Hogea. “New Methodology for Breaking Steganographic Techniques for JPEGs.” In Proc. SPIE, Santa Clara, CA: SPIE, 2003.
    • (2003) Proc. SPIE
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 160
  • 161
    • 0011994605 scopus 로고    scopus 로고
    • Technical Report 01-11. Ann Arbor, MI: Center for Information Technology Integration, University of Michigan
    • Provos, N. and P. Honeyman. Detecting Steganographic Content on the Internet. Technical Report 01-11. Ann Arbor, MI: Center for Information Technology Integration, University of Michigan, 2001.
    • (2001) Detecting Steganographic Content on the Internet.
    • Provos, N.1    Honeyman, P.2
  • 162
    • 1442360452 scopus 로고    scopus 로고
    • Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length
    • Fridrich, J., et al. “Quantitative Steganalysis of Digital Images: Estimating the Secret Message Length.” Multimedia Systems 9 (2003): 288.
    • (2003) Multimedia Systems , vol.9 , pp. 288
    • Fridrich, J.1
  • 164
    • 33845525292 scopus 로고    scopus 로고
    • Blind Steganography Detection Using a Computational Immune System: A Work in Progress
    • Jackson, J. T., et al. “Blind Steganography Detection Using a Computational Immune System: A Work in Progress.” Int. J. Digital Evidence (2003).
    • (2003) Int. J. Digital Evidence
    • Jackson, J.T.1
  • 165
    • 0034787093 scopus 로고    scopus 로고
    • Reliable Detection of LSB Steganography in Color and Grayscale Images
    • Ottawa, Ontario
    • Fridrich, J., M. Goljan, and R. Du. “Reliable Detection of LSB Steganography in Color and Grayscale Images.” In Proc. ACM Workshop Multimedia Security, Ottawa, Ontario, 2001.
    • (2001) Proc. ACM Workshop Multimedia Security
    • Fridrich, J.1    Goljan, M.2    Du, R.3
  • 169
    • 0002701935 scopus 로고    scopus 로고
    • Secure Steganographic Methods for Palette Images
    • Dresden, Germany
    • Fridrich, J., and R. Du. “Secure Steganographic Methods for Palette Images.” In Proc. Information Hiding Workshop. Dresden, Germany, 1999.
    • (1999) Proc. Information Hiding Workshop.
    • Fridrich, J.1    Du, R.2
  • 172
    • 33847675252 scopus 로고    scopus 로고
    • An Overview of Steganography for the Computer Forensics Examiner
    • Kessler, G. C. “An Overview of Steganography for the Computer Forensics Examiner.” Forensic Science Communications 6 (2004): 1.
    • (2004) Forensic Science Communications , vol.6 , pp. 1
    • Kessler, G.C.1
  • 173
    • 21944435694 scopus 로고    scopus 로고
    • Reliability of Objective Picture Quality Measures
    • Grgic, S., M. Grgic, and M. Mrak. “Reliability of Objective Picture Quality Measures.” J. Electrical Engineering 55 (2004): 3.
    • (2004) J. Electrical Engineering , vol.55 , pp. 3
    • Grgic, S.1    Grgic, M.2    Mrak, M.3
  • 174
    • 0022084120 scopus 로고
    • A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment
    • Nill, N. B. “A Visual Model Weighted Cosine Transform for Image Compression and Quality Assessment.” IEEE Trans. Communication 33 (1985): 551.
    • (1985) IEEE Trans. Communication , vol.33 , pp. 551
    • Nill, N.B.1
  • 175
    • 34249753618 scopus 로고
    • Support-Vector Networks
    • Cortes, C., and V. Vapnik. “Support-Vector Networks.” Machine Learning 20 (1995): 273.
    • (1995) Machine Learning , vol.20 , pp. 273
    • Cortes, C.1    Vapnik, V.2
  • 177
    • 27144489164 scopus 로고    scopus 로고
    • A Tutorial on Support Vector Machines for Pattern Recognition
    • Burges, C. “A Tutorial on Support Vector Machines for Pattern Recognition.” IEEE Trans. Data Mining and Knowledge Discovery 2 (1998): 121.
    • (1998) IEEE Trans. Data Mining and Knowledge Discovery , vol.2 , pp. 121
    • Burges, C.1
  • 179
    • 0038647814 scopus 로고    scopus 로고
    • Hierarchical Classification and Feature Reduction for Fast Face Detection with Support Vector Machines
    • Heisele, B., et al. “Hierarchical Classification and Feature Reduction for Fast Face Detection with Support Vector Machines.” Pattern Recognition 36 (2003): 2007.
    • (2003) Pattern Recognition , vol.36 , pp. 2007
    • Heisele, B.1
  • 180
    • 13644261756 scopus 로고    scopus 로고
    • Improved Feature Reduction in Input and Feature Spaces
    • Shih, F. Y., and S. Cheng. “Improved Feature Reduction in Input and Feature Spaces.” Pattern Recognition 38 (2005): 651.
    • (2005) Pattern Recognition , vol.38 , pp. 651
    • Shih, F.Y.1    Cheng, S.2
  • 181
    • 0007696417 scopus 로고    scopus 로고
    • Less Is More: Active Learning with Support Vector Machines
    • Stanford, CA: Stanford University
    • Schohn, G., and D. Cohn. “Less Is More: Active Learning with Support Vector Machines.” In Proc. Int. Conf. Machine Learning. Stanford, CA: Stanford University, 2000.
    • (2000) Proc. Int. Conf. Machine Learning.
    • Schohn, G.1    Cohn, D.2
  • 187
    • 34249753618 scopus 로고
    • Support-Vector Network
    • Cortes, C. and V. Vapnik. “Support-Vector Network.” Machine Learning 20 (1995): 273.
    • (1995) Machine Learning , vol.20 , pp. 273
    • Cortes, C.1    Vapnik, V.2
  • 189
    • 0036505670 scopus 로고    scopus 로고
    • A Comparison of Methods for Multiclass Support Vector Machines
    • Hsu, C. W., and C. J. Lin. “A Comparison of Methods for Multiclass Support Vector Machines.” IEEE Trans. Neural Networks 13 (2002): 415.
    • (2002) IEEE Trans. Neural Networks , vol.13 , pp. 415
    • Hsu, C.W.1    Lin, C.J.2
  • 192
    • 0005105932 scopus 로고    scopus 로고
    • High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm)
    • New York
    • Westfeld, A. “High Capacity Despite Better Steganalysis (F5-A Steganographic Algorithm).” In Proc. Int. Workshop Information Hiding. New York, 2001.
    • (2001) Proc. Int. Workshop Information Hiding.
    • Westfeld, A.1
  • 193
    • 85084160704 scopus 로고    scopus 로고
    • Defending against Statistical Steganalysis
    • Washington, DC
    • Provos, N. “Defending against Statistical Steganalysis.” In Proc. USENIX Security Symposium. Washington, DC, 2001.
    • (2001) Proc. USENIX Security Symposium.
    • Provos, N.1
  • 194
    • 0347390531 scopus 로고    scopus 로고
    • Steganalysis of JPEG Images: Breaking the F5 Algorithm
    • Noordwijkerhout, Netherlands
    • Fridrich, J., M. Goljan, and D. Hogea. “Steganalysis of JPEG Images: Breaking the F5 Algorithm.” In Proc. Int. Workshop Information Hiding. Noordwijkerhout, Netherlands, 2002, 310.
    • (2002) Proc. Int. Workshop Information Hiding. , pp. 310
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 195
    • 0242581862 scopus 로고    scopus 로고
    • A Novel Approach for Increasing Security and Data Embedding Capacity in Images for Data Hiding Applications
    • Las Vegas, NV
    • Alturki, F., and Mersereau, R. “A Novel Approach for Increasing Security and Data Embedding Capacity in Images for Data Hiding Applications.” In Proc. Int. Conf. Information Technology: Coding and Computing. Las Vegas, NV, 2001.
    • (2001) Proc. Int. Conf. Information Technology: Coding and Computing.
    • Alturki, F.1    Mersereau, R.2
  • 196
    • 4544225634 scopus 로고    scopus 로고
    • A DCT-Based Image Steganographic Method Resisting Statistical Attacks
    • Montreal, Quebec
    • Chu, R., et al. “A DCT-Based Image Steganographic Method Resisting Statistical Attacks.” In Intl. Conf. Acoustics, Speech, and Signal Processing. Montreal, Quebec, 2004.
    • (2004) Intl. Conf. Acoustics, Speech, and Signal Processing.
    • Chu, R.1
  • 198
    • 10444270831 scopus 로고    scopus 로고
    • Enhancement of Image Watermark Retrieval Based on Genetic Algorithm
    • Shih, F. Y. and Y.-T. Wu. “Enhancement of Image Watermark Retrieval Based on Genetic Algorithm.” J. Visual Commu. and Image Repr., 16 (2005): 115.
    • (2005) J. Visual Commu. and Image Repr. , vol.16 , pp. 115
    • Shih, F.Y.1    Wu, Y.-T.2
  • 199
    • 0001849187 scopus 로고    scopus 로고
    • Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned
    • Dresden, Germany
    • Westfeld, A., and A. Pfitzmann. “Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego, Jsteg, Steganos, and S-Tools and Some Lessons Learned.” In Proc. Int. Workshop Information Hiding. Dresden, Germany, 1999, 61.
    • (1999) Proc. Int. Workshop Information Hiding. , vol.61
    • Westfeld, A.1    Pfitzmann, A.2
  • 201
    • 0036530067 scopus 로고    scopus 로고
    • Statistical Analysis of Image Quality Measures
    • Avcibas, I., and Sankur, B. “Statistical Analysis of Image Quality Measures.” J. Electron. Imag. 11 (2002): 206.
    • (2002) J. Electron. Imag. , vol.11 , pp. 206
    • Avcibas, I.1    Sankur, B.2
  • 203
    • 0242497150 scopus 로고    scopus 로고
    • New Methodology for Breaking Steganographic Techniques for JPEGs
    • Santa Clara, CA: SPIE
    • Fridrich, J., M. Goljan, and D. Hogea. “New Methodology for Breaking Steganographic Techniques for JPEGs.” In Proc. SPIE, Santa Clara, CA: SPIE, 2003.
    • (2003) Proc. SPIE
    • Fridrich, J.1    Goljan, M.2    Hogea, D.3
  • 204
    • 85052459393 scopus 로고    scopus 로고
    • PictureMarc, Embed Watermark, v 1.00.45, Digimarc Corporation
    • PictureMarc, Embed Watermark, v 1.00.45, Digimarc Corporation.
  • 205
    • 0031362116 scopus 로고    scopus 로고
    • Secure Spread Spectrum Watermarking for Multimedia
    • Cox, I., et al. “Secure Spread Spectrum Watermarking for Multimedia.” IEEE Trans. Image Processing 6 (1997): 1673.
    • (1997) IEEE Trans. Image Processing , vol.6 , pp. 1673
    • Cox, I.1
  • 206
    • 85052468080 scopus 로고    scopus 로고
    • Shareware application, 1994. Available online at
    • Brown, A. S-Tools for Windows. Shareware application, 1994. Available online at ftp://idea.sec.dsi.unimi.it/pub/security/crypt/code/s-tools4.zip.
    • S-Tools for Windows.
    • Brown, A.1
  • 207
    • 0036556071 scopus 로고    scopus 로고
    • Combinational Image Watermarking in the Spatial and Frequency Domains
    • Shih, F. Y., and S. Y. Wu. “Combinational Image Watermarking in the Spatial and Frequency Domains.” Pattern Recognition 36 (2003): 969.
    • (2003) Pattern Recognition , vol.36 , pp. 969
    • Shih, F.Y.1    Wu, S.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.