원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.7 No.6
2013.11
pp.209-228
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. The Vector Quantization Scheme
3. The Proposed Method
3.1 The Watermark Generation Procedure
3.2. The Watermark Embedding Procedure
3.3. The Tamper Detection Procedure
3.4. The Image Recovery Procedure
4. Experimental Results
5. Conclusions
References
1. Introduction
2. The Vector Quantization Scheme
3. The Proposed Method
3.1 The Watermark Generation Procedure
3.2. The Watermark Embedding Procedure
3.3. The Tamper Detection Procedure
3.4. The Image Recovery Procedure
4. Experimental Results
5. Conclusions
References
저자정보
참고문헌
자료제공 : 네이버학술정보
