Digital watermarking techniques for image security: a review
暂无分享,去创建一个
D PrasannaVenkatesanG.K. | Kamalraj Subramaniam | Renjith V. Ravi | C. S. Manikandababu | A. Mohanarathinam | K. Subramaniam | A. Mohanarathinam | D. PrasannaVenkatesanG.K.
[1] Asifullah Khan,et al. Wavelet Based Image Authentication and Recovery , 2007, Journal of Computer Science and Technology.
[2] Deepa Kundur,et al. A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.
[3] S. Han,et al. A survey of digital image watermarking techniques , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[4] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[5] Tung-Shou Chen,et al. Image tamper detection and recovery system based on discrete wavelet transformation , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).
[6] Dinu Coltuc,et al. Improved Embedding for Prediction-Based Reversible Watermarking , 2011, IEEE Transactions on Information Forensics and Security.
[7] Regunathan Radhakrishnan,et al. On the security of the digest function in the SARI image authentication system , 2002, IEEE Trans. Circuits Syst. Video Technol..
[8] A. E. Bell. The dynamic digital disk , 1999 .
[9] Heung-Kyu Lee,et al. Perceptually tuned robust watermarking scheme for digital images , 2000, Pattern Recognit. Lett..
[10] Tor A. Ramstad,et al. Hybrid KLT-SVD image compression , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[11] Shigeo Wada,et al. Wavelet-based perceptual watermarking with bit data embedded in still color images , 2004 .
[12] Chin-Chen Chang,et al. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery , 2008, Pattern Recognit..
[13] Ahmet M. Eskicioglu,et al. Robust DWT-SVD domain image watermarking: embedding data in all frequencies , 2004, MM&Sec '04.
[14] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[15] Jean-Jacques Quisquater,et al. Cryptology for digital TV broadcasting , 1995, Proc. IEEE.
[16] Chien-Chang Chen,et al. A wavelet-based public key image authentication watermarking , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[17] Qiang Li,et al. Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model , 2007, The 9th International Conference on Advanced Communication Technology.
[18] Chun-Shien Lu,et al. Multipurpose watermarking for image authentication and protection , 2001, IEEE Trans. Image Process..
[19] Aboul Ella Hassanien,et al. A rough k-means fragile watermarking approach for image authentication , 2011, 2011 Federated Conference on Computer Science and Information Systems (FedCSIS).
[20] Nalini K. Ratha,et al. Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.
[21] Yong-Huai Huang,et al. Hiding digital watermarks using multiresolution wavelet transform , 2001, IEEE Trans. Ind. Electron..
[22] Xingming Sun,et al. A Semi-Fragile Watermarking Algorithm using Adaptive Least Significant Bit Substitution , 2010 .
[23] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[24] Gwoboa Horng,et al. A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model , 2003 .
[25] E. Mwangi,et al. An image watermarking method based on the singular value decomposition and the wavelet transform , 2007, AFRICON 2007.
[26] S. Nash,et al. Numerical methods and software , 1990 .
[27] Chang-Tsun Li,et al. Semi-fragile watermarking scheme for authentication of JPEG images , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[28] Iuon-Chang Lin,et al. Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..
[29] A. Hassani Allaf,et al. A Review of Digital Watermarking Applications for Medical Image Exchange Security , 2018, Innovations in Smart Cities Applications Edition 2.
[30] A. K. Singh,et al. A novel technique for digital image watermarking in spatial domain , 2012, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing.
[31] Shalu Singh,et al. A secure non-blind block based digital image watermarking technique using DWT and DCT , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[32] Chin-Chen Chang,et al. Secure discrete-cosine-transform-based technique for recoverable tamper proofing , 2001 .
[33] Peter Meerwald. Quantization Watermarking in the JPEG2000 Coding Pipeline , 2001, Communications and Multimedia Security.
[34] M. Raval,et al. Discrete wavelet transform based multiple watermarking scheme , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.
[35] Martin Steinebach,et al. Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability , 2006, 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'06).
[36] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[37] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[38] Shan Suthaharan,et al. Fragile image watermarking using a gradient image for improved localization and security , 2004, Pattern Recognit. Lett..
[39] Young-ho Seo. A Digital Watermarking Algorithm Using Correlation of the Tree Structure of DWT Coefficients , 2004 .
[40] Min-Jen Tsai,et al. Joint wavelet and spatial transformation for digital watermarking , 2000, IEEE Trans. Consumer Electron..
[41] Ashok A. Ghatol,et al. Composition of DCT-SVD Image Watermarking and Advanced Encryption Standard Technique for Still Image , 2016 .
[42] Jeng-Shyang Pan,et al. Genetic watermarking based on transform-domain techniques , 2004, Pattern Recognit..
[43] Tung-Shou Chen,et al. Detecting and restoring the tampered images based on iteration-free fractal compression , 2003, J. Syst. Softw..
[44] Ahmet M. Eskicioglu,et al. A robust multiple watermarking scheme in the discrete wavelet transform domain , 2004, SPIE Optics East.
[45] Wei Ren,et al. LMDGW: a novel matrix based dynamic graph watermark , 2017, Journal of Ambient Intelligence and Humanized Computing.
[46] Jeng-Shyang Pan,et al. A Double Domain Based Robust Digital Image Watermarking Scheme , 2008, Edutainment.
[47] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[48] Ja-Ling Wu,et al. Multiresolution watermarking for digital images , 1998 .
[49] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[50] Chih-Chin Lai,et al. Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[51] Heung-Kyu Lee,et al. Robust Image Watermark Using Radon Transform and Bispectrum Invariants , 2002, Information Hiding.
[52] A. Alti,et al. A New Blind Medical Image Watermarking Based on Weber Descriptors and Arnold Chaotic Map , 2018, Arabian Journal for Science and Engineering.
[53] Seungjae Lee,et al. An SVD-based watermarking method for image content authentication with improved security , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[54] Zheng Qin,et al. Composing Semantic Web Services with PDDL , 2010 .
[55] Xiaohui Zhao,et al. A digital image watermarking method based on host image analysis and genetic algorithm , 2016, J. Ambient Intell. Humaniz. Comput..