https://scholars.lib.ntu.edu.tw/handle/123456789/325340
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Yi-Chong Zeng | en_US |
dc.contributor.author | S. C. Pei | en_US |
dc.contributor.author | SOO-CHANG PEI | zz |
dc.creator | Yi-Chong Zeng;S. C. Pei | - |
dc.date.accessioned | 2018-09-10T06:02:08Z | - |
dc.date.available | 2018-09-10T06:02:08Z | - |
dc.date.issued | 2006-03 | - |
dc.identifier.uri | http://scholars.lib.ntu.edu.tw/handle/123456789/325340 | - |
dc.description.abstract | We propose a novel semi-fragile multiple-watermarking algorithm based on quantization index modulation. This algorithm utilizes two quantization steps to yield the non-uniform intervals in the real-number axis. Each interval corresponds to one binary symbol, includes stable-zero (S0), unstable-zero (U0), stable-one (S1), and unstable-one (U1). In addition, visual cryptography is integrated with the watermarking algorithm to increase the watermark capacity. Therefore, the host image is embedded the multiple watermarks, and then we extract the watermarks from the corrupted image. According to the extracted watermarks, the algorithm achieves the tamper proofing and attack identification. From the experimental result, it shows single and multiple tampered areas are detected and demonstrates that the amount of test images will not influence the accuracy of attack identification. Copyright 2006 ACM. | - |
dc.language | en | en |
dc.relation.ispartof | 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS’06) | en_US |
dc.source | AH-anncc | - |
dc.subject | Attack identification; Multiple-watermark; Semi-fragile watermarking; Tamper proofing; Visual cryptography | - |
dc.subject.classification | [SDGs]SDG16 | - |
dc.subject.other | Attack identification; Multiple-watermarks; Semi-fragile watermarking; Tamper proofing; Visual cryptography; Algorithms; Codes (symbols); Computer crime; Cryptography; Image analysis; Number theory; Digital watermarking | - |
dc.title | Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm | - |
dc.type | conference paper | en |
dc.identifier.doi | 10.1145/1128817.1128843 | - |
dc.identifier.scopus | 2-s2.0-34247366436 | - |
dc.relation.pages | 166 -174 | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | conference paper | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.fulltext | no fulltext | - |
crisitem.author.dept | Photonics and Optoelectronics | - |
crisitem.author.dept | Networking and Multimedia | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
crisitem.author.parentorg | College of Electrical Engineering and Computer Science | - |
顯示於: | 電機工程學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。