17
Views
2
CrossRef citations to date
0
Altmetric
Research Articles

Asymmetric image watermarking based on reversible chaotic maps

Pages 53-64 | Published online: 18 Jul 2013

References

  • Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–336.
  • Cox, J., Kilian, J., Leighton, F. T. and Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process., 1997, 6(12), 1673–1687.
  • Barni, M., Bartolini, F., Cappellini, V. and Piva, A. A DCT-domain system for robust image watermarking. Signal Process., 1998, 66, 357–372.
  • Hsu, C.-T. and Wu, J.-L. Hidden digital watermarks in images. IEEE Trans. Image Process., 1999, 8(1), 58–68.
  • Lou, D.-C. and Sung, C.-H. Robust watermarking technique for digital image utilizing invariant relation of vector quantization indices. Imag. Sci. J., 2002, 50, 291–302.
  • Podilchuck, C. I. and Zeng, W. Image-adaptive watermarking using visual models. IEEE J. Select. Areas Commun., 1998, 16(4), 525–539.
  • Lou, D.-C. and Yin, T.-L. Adaptive digital watermarking using fuzzy logic technique. Opt. Eng., 2002, 41(10), 2675–2687.
  • Solachidis, V. and Pitas, I. Circularly symmetric watermark embedding in 2D DFT domain. IEEE Trans. Image Process., 2001, 10(11), 1741–1753.
  • Craver, S. and Katzenbeisser, S. Security analysis of public-key watermarking schemes. In Mathematics of Data/Image Coding, Compression, and Encryption, with Applications, Proceedings of SPIE, Vol. 4475 (Ed. M. S. Schmalz), 2001, pp. 172–182 (Society of Photo-optical Instrumental Engineers, Bellingham, Washington).
  • Hartung, F. and Girod, B. Fast public-key watermarking of compressed video. In Proceedings of the IEEE International Conference on Image Processing, 1997, pp. 528–531. IEEE, Piscataway, NJ.
  • Schyndel, R. G. van, Tirkel, A. Z. and Svalbe, I. D. Key independent watermark detection. In Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999, pp. 580–585. IEEE, Piscataway, NJ.
  • Eggers, J. J., Su, J. K. and Girod, B. Asymmetric watermarking schemes. In Tagungsband des GI Workshops Sicherheit in Mediendaten, 2000 (Springer, Berlin).
  • Eggers, J. J., Su, J. K. and Girod, B. Public key watermarking by eigenvectors of linear transforms. In Proceedings of the European Signal Processing Conference, 2000, EURASIP (European Association for Speech and Image Processing), Switzerland.
  • Furon, T. and Duhamel, P. An asymmetric public detection watermarking technique. In Proceedings of the Third International Workshop on Information Hiding (Ed. A. Pfitzmann), 1999, Springer, Berlin, pp. 88–100.
  • Craver, S. Zero knowledge watermark detection. In Proceedings of the Third International Workshop on Information Hiding (Ed. A. Pfitzmann), 1999, Springer, Berlin, pp. 101–116.
  • Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signature and public-key cryptosystems. Commun. ACM, 1978, 21(2), 120–126.
  • Stallings, W. Cryptography and Network Security: Principles and Practice, 2002, 3rd edition (Prentice-Hall, Englewood Cliffs, NJ).
  • Lenstra, K. and Manasse, M. S. Factoring with two large primes. Math. Comput., 1994, 63, 785–798.
  • Devaney, R. L. An Introduction to Chaotic Dynamical System, 1986 (Benjamin Cummings, San Francisco).
  • Arnold, V. I. and Avez, A. Ergodic Problems of Classical Mechanics, 1968 (W. A. Benjamin, New York/Amsterdam).
  • Habutsu, T., Nishio, Y., Sasase, I. and Mori, S. A secret key cryptosystem by iterating a chaotic map. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, 1991, Springer, Berlin, pp. 127–140.
  • Lou, D.-C. and Sung, C.-H. A steganographic scheme for secure communication based on chaos and Euler theorem. IEEE Trans. Multimedia, to be published.
  • Craver, S., Memon, N., Yeo, B.-L. and Yeung, M. M. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Select. Areas Commun., 1998, 16(4), 573–586.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.