메뉴 건너뛰기




Volumn , Issue , 2001, Pages 535-540

A taxonomy for image authentication techniques and its application to the current state of the art

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; IMAGE ANALYSIS; TAXONOMIES;

EID: 8644266262     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIAP.2001.957065     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 1
    • 0027697301 scopus 로고
    • The trustworthy digital camera: Restoring credibility to the photographic image
    • G.L. Friedman, "The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image", IEEE Trans. Consumer Electronics, vol. 39, 1993, pp. 905-910.
    • (1993) IEEE Trans. Consumer Electronics , vol.39 , pp. 905-910
    • Friedman, G.L.1
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystem
    • February
    • R.L. Rivest, A. Shamir, L. Adlemann, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystem", Comm. Of ACM, February 1978, pp. 120126.
    • (1978) Comm. of ACM , pp. 120126
    • Rivest, R.L.1    Shamir, A.2    Adlemann, L.3
  • 10
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • M. Yeung, C. Mintzer, "An invisible watermarking technique for image verification", Proc. of ICIP 1997, pp.680-683.
    • (1997) Proc. of ICIP , pp. 680-683
    • Yeung, M.1    Mintzer, C.2
  • 11
    • 0003356542 scopus 로고    scopus 로고
    • A watermark for image integrity and ownership verification
    • Portland, OR
    • P.W. Wong, "A watermark for image integrity and ownership verification", Proc. of IS&T PIC Conf., Portland, OR, 1997.
    • (1997) Proc. of IS&T PIC Conf.
    • Wong, P.W.1
  • 13
    • 0032648596 scopus 로고    scopus 로고
    • Digital watermarking for telltale tamper proofing and authentication
    • July
    • D. Kundur, D. Hatzinakos, "Digital Watermarking for Telltale Tamper Proofing and Authentication", Proc. of IEEE, vol. 87, no. 7, July 1999.
    • (1999) Proc. of IEEE , vol.87 , Issue.7
    • Kundur, D.1    Hatzinakos, D.2
  • 15
    • 0032292847 scopus 로고    scopus 로고
    • Image watermarking for tamper detection
    • J. Fridrich, "Image Watermarking for Tamper Detection", Proc. of ICIP 1998.
    • (1998) Proc. of ICIP
    • Fridrich, J.1
  • 20
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • March
    • M. Holliman, N. Memon, "Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes", IEEE Trans. Image Proc, vol. 9, no. 3, March 2000, pp. 422-441.
    • (2000) IEEE Trans. Image Proc , vol.9 , Issue.3 , pp. 422-441
    • Holliman, M.1    Memon, N.2
  • 21
    • 0033682895 scopus 로고    scopus 로고
    • Secret and public key authentication watermarking schemes that resist vector quantization attack
    • 2426 January
    • W. Wong, N.Memon, "Secret and Public Key Authentication Watermarking Schemes that Resist Vector Quantization Attack", ", Proc. of SPIE Security and Watermarking of Multimedia Contents II, Vol. 3971, 2426 January 2000, pp. 417-427.
    • (2000) Proc. of SPIE Security and Watermarking of Multimedia Contents II , vol.3971 , pp. 417-427
    • Wong, W.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.