CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES
A. V. Subramanyam, Sabu Emmanuel
2011
Abstract
.
References
- Bianchi, T., Piva, A., and Barni, M. (2010). Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Transactions on Information Forensics and Security, 5(1):180-187.
- Blobel, B. (2004). Authorisation and access control for electronic health record systems. International Journal of Medical Informatics, 73(3):251-257.
- Caldelli, R., Filippini, F., and Barni, M. (2006). Joint nearlossless compression and watermarking of still images for authentication and tamper localization. Signal Processing: Image Communication, 21(10):890-903.
- Cancellaro, M., Battisti, F., Carli, M., Boato, G., De Natale, F., and Neri, A. (2008). A joint digital watermarking and encryption method. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. Proc of the SPIE, volume 6819, pages 68191C-68191C, 2008.
- Fang, T. (2009). On performance of lossless compression for HDR image quantized in color space. Signal Processing: Image Communication, 24(5):397-404.
- Katzenbeisser, S., Lemma, A., Celik, M., van der Veen, M., and Maas, M. (2008). A buyer-seller watermarking protocol based on secure embedding. IEEE Transactions on Information Forensics and Security, 3(4):783-786.
- Lian, S., Liu, Z., Zhen, R., and Wang, H. (2006). Commutative watermarking and encryption for media data. Optical Engineering, 45:1-3.
- Piva, A., Bianchi, T., and De Rosa, A. (2010). Secure client-side ST-DM watermark embedding. Information Forensics and Security, IEEE Transactions on, 5(1):13-26.
- Schneier, B. (1996). Applied Cryptography. John Wiley and Sons, New York.
- Thomas, T., Emmanuel, S., Subramanyam, A., and Kankanhalli, M. (2009). Joint watermarking scheme for multiparty multilevel DRM architecture. IEEE Transactions on Information Forensics and Security, 4(4):758-767.
- Weinberger, M., Seroussi, G., and Sapiro, G. (2000). The LOCO-I lossless image compression algorithm: principles andstandardization into JPEG-LS. IEEE Transactions on Image Processing, 9(8):1309-1324.
- Zhao, B., Kou, W., Li, H., Dang, L., and Zhang, J. (2010). Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol. Information Sciences, pages 4672-4684.
Paper Citation
in Harvard Style
Subramanyam A. and Emmanuel S. (2011). CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES . In Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2011) ISBN 978-989-8425-72-0, pages 161-166. DOI: 10.5220/0003446201610166
in Bibtex Style
@conference{sigmap11,
author={A. V. Subramanyam and Sabu Emmanuel},
title={CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES},
booktitle={Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2011)},
year={2011},
pages={161-166},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003446201610166},
isbn={978-989-8425-72-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2011)
TI - CONTEXT BASED WATERMARKING OF SECURE JPEG-LS IMAGES
SN - 978-989-8425-72-0
AU - Subramanyam A.
AU - Emmanuel S.
PY - 2011
SP - 161
EP - 166
DO - 10.5220/0003446201610166