웨이블릿 변환을 이용한 정보은닉 방법

  • 안일영 (서정대학교 인터넷정보과)
  • Published : 2018.06.29

Abstract

Keywords

References

  1. P. Meerwald and A. Uhl, "A Survey of Wavelet-domain Watermarking Algorithms", Security and watermarking of multimedia contents III, Proceedings of SPIE vol.4314, pp.505-516, 2001.
  2. I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2001.
  3. M. Al-Mohimeed, "Wavelet-based Digital Watermarking", Security and watermarking of multimedia contents III, Proceedings of SPIE vol.4314, pp.418-423, 2001.
  4. Chien Chang Chen and De-Sheng Kao, "DCT Based Reversible Image Watermarking Approach", Third IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.482-492, 2007.
  5. I. Cox, J. Kilian, T. Leighton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, vol.6 no.12, pp.1673-1687, Dec 1997. https://doi.org/10.1109/83.650120
  6. Y. Yang, X. Sun, H. Yang, and C.T. Li, "A Removable Visible Image Watermarking Algorithm in DCT Domain," Journal of Electronic Imaging, Vol. 17, No. 3, pp.033008-1-033008-11, July-September, 2008. https://doi.org/10.1117/1.2952843
  7. V. S. Jabede, S. R. Gengaje, "Literature Review of Wavelet based Digital Imgae Watermarking Techniques," International Journal of Computer Applications, Vol.31, No.1, pp.28-35 Oct. 2011. https://doi.org/10.5120/3790-5218
  8. A. S. Lewis, G. Knowles, "Image Compression using the 2-D Wavelet Transform," IEEE Transactions on image Processing, pp.244-250, Apr. 1992.
  9. Hai Tao, Li Chongmin,Jasni Mohamad Zain, Ahmed N. Abdalla, "Robust Image Watermarking Theories and Techniques: A Review,"Journal of Applied Research and Technology, vol.12 pp.122-136, Feb. 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
  10. M. Barni, F. Bartolini, A. De Rosa, Piva A, "Capacity of the Watermark Channel: How many bits can be hidden within a digital image?," Security and Watermarking of Multimedia Contents, 1999, Proceedings of SPIE 3657, pp.437-448.
  11. W. C. Ku, T. C. Chou, H. L. Wu, J. C. Chang, "A fragile watermarking scheme for Image Authentication with Tamper Detection and Localization," 2010 Fourth International Conference on Genetic and Evolutionary Computing, Dec. 2010, pp.638-641
  12. M. Barni, F. Bartolini and A. Piva, "Improved Wavelet-based Watermarking Through Pixel-wise Masking", IEEE Trans. on Image Processing, Vol.10, No.5, pp.783-791, May 2001. https://doi.org/10.1109/83.918570
  13. E. Houssein, M. Ali and A. E. Hassanien, "An Image Steganography Algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System", Proceedings of the Federated Conference on Computer Science and Information System pp.641-644, 2016.
  14. M. Antonini, M. Barlaud, "Image Coding Using Wavelet Transform", IEEE Trans. on Image Processing, Vol. 1, No. 2, pp.205-220, April 1992. https://doi.org/10.1109/83.136597
  15. D. Kundur and D. Hatzinakos, "Digital Watermarking using Multiresolution Wavelet Decomposition", Proceedings of the 1998 IEEE International Conference Acoustic, Speech, Signal Processing, Vol. 5, pp.2969-2972.
  16. Ester Yen, Kai-Shiang Tsai,"HDWT-based Grayscale Watermark For Copyright Protection", Expert Systems with Applications 35, Elsevier, pp.301-306, 2008, . https://doi.org/10.1016/j.eswa.2007.06.040
  17. A. A. Reddy, B. N. Chatterji, "A new Wavelet based Logo-watermarking Scheme", Pattern Recognition Letters, Vol.26, Issue7, pp.1019-1027, May 2005. https://doi.org/10.1016/j.patrec.2004.09.047
  18. S. H. Wang and Y. P. Lin, "Wavelet Tree Quantization for Copyright Protection Watermarking", IEEE Trans. On Image Processing, Vol.13, No.2, pp.154-165, Feb. 2004. https://doi.org/10.1109/TIP.2004.823822
  19. Z. Yuefeng and L. Li,"Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-recovery", International Journal on Smart Sensing & Intelligent Systems, Vol.8 Issue 1, pp.199-219, Mar. 2015. https://doi.org/10.21307/ijssis-2017-755