CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES

A. V. Subramanyam, Sabu Emmanuel

2011

Abstract

.

References

  1. Bianchi, T., Piva, A., and Barni, M. (2010). Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Information Forensics and Security, 5(1):180-187.
  2. Blobel, B. (2004). Authorisation and access control for electronic health record systems. International Journal of Medical Informatics, 73(3):251-257.
  3. Caldelli, R., Filippini, F., and Barni, M. (2006). Joint nearlossless compression and watermarking of still images for authentication and tamper localization. Signal Processing: Image Communication, 21(10):890-903.
  4. Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F., and Neri, A. (2008). A joint digital watermarking and encryption method. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc of the SPIE, volume 6819, pages 68191C-68191C, 2008.
  5. Fang, T. (2009). On performance of lossless compression for HDR image quantized in color space. Signal Processing: Image Communication, 24(5):397-404.
  6. Katzenbeisser, S., Lemma, A., Celik, M., van der Veen, M., and Maas, M. (2008). A buyer-seller watermarking protocol based on secure embedding. IEEE Transactions on Information Forensics and Security, 3(4):783-786.
  7. Lian, S., Liu, Z., Zhen, R., and Wang, H. (2006). Commutative watermarking and encryption for media data. Optical Engineering, 45:1-3.
  8. Piva, A., Bianchi, T., and De Rosa, A. (2010). Secure client-side ST-DM watermark embedding. Information Forensics and Security, IEEE Transactions on, 5(1):13-26.
  9. Schneier, B. (1996). Applied Cryptography. John Wiley and Sons, New York.
  10. Thomas, T., Emmanuel, S., Subramanyam, A., and Kankanhalli, M. (2009). Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security, 4(4):758-767.
  11. Weinberger, M., Seroussi, G., and Sapiro, G. (2000). The LOCO-I lossless image compression algorithm: principles andstandardization into JPEG-LS. IEEE Transactions on Image Processing, 9(8):1309-1324.
  12. Zhao, B., Kou, W., Li, H., Dang, L., and Zhang, J. (2010). Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. Information Sciences, pages 4672-4684.
Download


Paper Citation


in Harvard Style

Subramanyam A. and Emmanuel S. (2011). CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES . In Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2011) ISBN 978-989-8425-72-0, pages 161-166. DOI: 10.5220/0003446201610166


in Bibtex Style

@conference{sigmap11,
author={A. V. Subramanyam and Sabu Emmanuel},
title={CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES},
booktitle={Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2011)},
year={2011},
pages={161-166},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003446201610166},
isbn={978-989-8425-72-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2011)
TI - CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES
SN - 978-989-8425-72-0
AU - Subramanyam A.
AU - Emmanuel S.
PY - 2011
SP - 161
EP - 166
DO - 10.5220/0003446201610166