A Study on Semi-fragile Watermarking for Robust Authentication on Image Compression |
Ahn, Sung-Cheol
((주)디티브이인터랙티브)
Lee, Kyoung-Hak (광운대학교 전자통신공학과 영상처리연구실) Park, Hwa-Bum (광운대학교 전자통신공학과 영상처리연구실) Ko, Hyung-Hwa (광운대학교 전자통신공학과 영상처리연구실) |
1 | R.J. Anderson and F. Petitcolas, 'On the Limits of Steganography,' IEEE J. Select Areas Commun., Vol. 16, pp. 474-481, May 1998 DOI ScienceOn |
2 | Gary L. Friedman, 'The Trustworthy Digital Camera Restoring Credibility to the Photographic Image,' IEEE Trans. on Consumer Electronics, Vol. 39, No.4, November 1993 |
3 | I.J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673-1687, December 1997 DOI ScienceOn |
4 | C.Y. Lin and S.F. Chang, 'Semi-Fragile Watermarking for Authentication JPEG Visual Content,' SPIE ICSQMCII, Vol. 3971, No. 13, EI '00, 2000 |
5 | J.J.K. O Ruanaidh, W.J. Dowling, and F.M. Boland, 'Watermarking Digital Images for Copyright Protection,' IEE Proc. vis. Image Signal Process. Vol. 143, No.4, pp.250-256, August 1996 DOI ScienceOn |
6 | I.J. Cox and M.L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling,' Proc. SPIE Conf. on H.V. Electronic Imaging II, Vol. 3-16, pp. 92-99, February 1997 |
7 | P.W. Wong 'A Public Key Watermark for Image Authentication,' ICIP 98. Proceedings Vol. 2, pp.437-441 |
8 | J. Fridrich, M. Goljan and R. Du, 'Invertible Authentication,' in Proc. SPIE, San Jose CA, January 23-26, 2001 |
9 | R.B. Wolfgang and E.J. Delp, 'A Watermarking Teclnique for Digital Imagery : Further Studies,' Video and Imaging Processing Laboratory, Proceeding of the International Conf. on Imaging Science, pp.279-287, 1997 |
10 | D. Kundur and D. Hatzinakos, 'Digital Watermarking for Telltale Tamper Proofmg and Authentication,' Proc. of the IEEE Identification and Protection of Multimedia Information, Vol. 87(7), pp. 1167-1180, July 1999 |
11 | Nikolaidis, N., and Pitas, I., 'Digital Image Watermarking: An Overview,' IEEE IICMCS, Florence, Italy, 1999 |
12 | P.S.M. Barreto, H.Y. Kim, and V. Rijmen, 'Toward Secure Public-key Blockwise Fragile Authentication Watermarking,' in IEEE Proc. V.I.S.P, Vol. 148, No.2, pp.57-62, April 2002 |
13 | M. Wu and B. Liu, 'Watermarking for Image Authentication,' IEEE National Conf. on Image Processing, 1998 |
14 | N. F. Johnson, Z. Duric and S. Jajodia, 'Information Hiding: Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp.22-29, 2001 |
15 | C.K. Ho and C.T. Li, 'Semi-fragile Watermarking Scheme for Authentication of JPEG Image,' in Proc. IEEE ICIT LV, USA, April 2004 |