24
Views
0
CrossRef citations to date
0
Altmetric
Original Article

Watermarking for multi-stage encoded image authentication

, &
Pages 65-79 | Accepted 16 Jun 2011, Published online: 12 Nov 2013

REFERENCES

  • Queluz MP. Authentication of digital images and video: generic models and a new contribution. Signal Process.: Image Commun., 2001, 16, 461–475.
  • Lin CY, Chang SF. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol., 2001, 11, 153–168.
  • Xie L, Arce GR, Graveman RF. Approximate image message authentication codes. IEEE Trans. Multimedia, 2001, 3, 242–252.
  • Tsai P, Hu YC, Chang CC. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process.: Image Commun., 2003, 18, 813–822.
  • Sun Q, Chang SF. A secure and robust digital signature scheme for JPEG2000 image authentication. IEEE Trans. Multimedia, 2005, 7, 480–494.
  • Tsai P, Hu YC, Chang CC. A novel image authentication scheme based on quadtree segmentation. Image Sci. J., 2005, 58, 149–162.
  • Groshois R, Gerhelot P, Ehrahimi T. Authentication and access control in the JPEG 2000 compressed domain. Proc. SPIE, 2001, 4472, 95–104.
  • Wu Y, Ma D, Deng RH. Progressive protection of JPEG2000 codestreams, Proc. IEEE Int. Conf. on Image processing :ICIP 2004, Singapore, October 2004, IEEE, pp. 3447–3450.
  • Chen CC, Lin CS. Toward a robust image authentication method surviving JPEG lossy compression. J. Inf. Sci. Eng., 2007, 23, 511–524.
  • Celik MU, Sharma G, Saber E, Tekalp AM. Hierarchical watermarking for secure image authentication with localization. IEEE Trans. Image Process., 2002, 11, 585–594.
  • Lu CS, Liao HYM. Structural digital signature for image authentication: an incident distortion resistant scheme. IEEE Trans. Multimedia, 2003, 5, 161–173.
  • Zhang HB, Chang Y, Quan XM. Image authentication based on digital signature and semi-fragile watermarking. J. Comput. Sci. Technol., 2004, 19, 752–759.
  • Bao P, Ma X. Image adaptive watermarking using domain singular value decomposition. IEEE Trans. Circuits Syst. Video Technol., 2005, 15, 96–106.
  • Lu ZM, Xu DG, Sun SH. Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans. Image Process., 2005, 14, 822–831.
  • Tsai P, Hu YC. A watermarking-based authentication with malicious detection and recovery, Proc. IEEE Int. Conf. on Information, communications and signal processing: ICICS 2005, Bangkok, Thailand, December 2005, IEEE, pp. 865–869.
  • Chang CC, Hu YS, Lu TC. A watermarking-based image ownership and tampering authentication scheme. Patt. Recogn. Lett., 2006, 27, 439–446.
  • Masmoudi A, Bouhlel MS. A proposal for progressive authentication and data integrity of JPEG2000 codestreams, Proc. IEEE Int. Conf. on Information and communication technologies and development: ICID 2006, Berkeley, CA, USA, May 2006, IEEE/ACM, pp. 1463–1467.
  • Tsai P. A watermarking-based authentication for progressive transmission images, Proc. Int. Computer Symp.: ICS 2006, Taipei, Taiwan, December 2006, Yuan Ze University, pp. 1173–1178.
  • Chang CC, Lin PY, Chuang JC. Fragile watermarking scheme for digital image authentication using pixel difference. Imag. Sci. J., 2007, 55, 140–147.
  • Lee WB, Li JH, Chen SC, Chen TH. An authenticated secure image hiding scheme. Imag. Sci. J., 2009, 57, 109–117.
  • Huang HC, Pan JS, Shieh CS, Wang FH. Progressive watermarking techniques with genetic algorithms, Proc. 37th IEEE Int. Carnahan Conf. on Security technology: ICCST 2003, Taipei, Taiwan, October 2003, IEEE, pp. 62–65.
  • Steinder M, Iren S, Amer PD. Progressively authenticated image transmission, Proc. IEEE Int. Conf. on Military communications: MILCOM ’99, Vancouver, BC, Canada, November 1999, IEEE, pp. 641–645.
  • Amiri MD, Danyali H, Bahram ZA. An adaptive robust and multiresolution image watermarking for progressive wavelet image coding, Proc. Int. Conf. on Wireless communications networking and mobile computing: WiCOM 2010, Chengdu, China, September 2010, IEEE, pp. 1–4.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.