Broad Bibliography - Villanova University

salamiblackΗλεκτρονική - Συσκευές

27 Νοε 2013 (πριν από 4 χρόνια και 1 μήνα)

145 εμφανίσεις

Name:
Nathan Singleton

Topic:
Computerized Image Processing for Forgery Prevention

Description:
This research paper will investigate discuss problems with and make suggestions for
current forgery detection software.

Motivation:
Every year computers
have been able to display pictures with higher resolution. This has
made forging checks, identification, and paintings a simple task. The world economy suffers because of
forgery of all types of documents and paintings.

References:



Song, Y. J., R. Z. Li
u, and T. A. Tan.
Digital Watermarking for Forgery Detection in Printed
Materials
. Tech. National Lab of Pattern Recognition Institute of Automation, Chinese Academy
of Sciences. Web. 14 Sept. 2009.
<http://www.springerlink.com/content/gw9rf6gyeptmen93/ful
ltext.pdf>.

[
Great Research
paper of forgery. Good sources to look back at.]



Mohanty, Saraju P., N. Ranganathan, and Ravi K. Namballa.
VLSI Implementation of
VisibleWatermarking for a Secure Digital Still Camera Design
. Rep. Print.

<

http://www.cse.unt.e
du/~smohanty/research/ConfPapers/2004/MohantyVLSID2004Chip.pdf
>

[Proposes a hardware implementation in order to watermark pictures. Also shows two separate
algorithms and how they work when implemented.]



N. Memon and P. W. Wong, “Protecting Digital Media

C
ontent,”
Comm. of the ACM
, vol. 41, no.
7, pp. 34
-
43, Jul 1998.

[Gives definitions to specific types of watermarks and gives outlines of
what can be done with them.



Mohanty, Saraju P.
Digital Watermarking : A Tutorial Review
. Rep. Web. 25 Sept. 2009.
<http
://www.informatika.org/~rinaldi/Kriptografi/WMSurvey1999Mohanty.pdf>.

[Provides a history of hiding information, key definitions and comparisons of techniques.
Partially delves into Steganography]



Mohanty, Saraju P.
Watermarking of Digital Images
. Rep. IN
DIAN INSTITUE OF SCIENCE, 1999.
Print.

[Writes about technical issues with digital watermarking.
Talks about image distortion
and difficult keeping the image intact, while emplacing a watermark.]



Meerwald, Peter, and Shelby Pereira.
Attacks, applications

and evaluation of known
watermarking algorithms with Checkmark
. Tech. Austria: Department of Computing Science.
Print. [Checkmark is a tool that is used to evaluate watermarking algorithms. This paper
evaluates many algorithms that have been made in orde
r to hide messages in images. ]



Kundur, and Hatzinakos.
Digital Watermarking for Telltale Tamper
-
Proofing and Authentication
.
Tech. Toronto: Natural Sciences and Engineering Research Coucil and Canada, 1999. Print.

[Provides analysis for
digital watermarki
ng, and more specifically, fragile watermarking of still
images. The author provides research in order to help court rooms recognize legitimate images.]



Voyatzis, G., and I. Pitas.
The Use of Watermarks in the Protection of Digital Multimedia
Products
. Rep
. Thessaloniki: University of Thessaloniki, 1999. Print. [Focuses on products
implementing Watermarking algorithms, and outlines ways in which media is stolen from
others.]



Sencar, Http://delivery.acm.org/10.1145/1110000/1102563/p93
-
sencar.pdf?key1=1102563
&key2=9910614521&coll=GUIDE&dl=GUIDE&CFID=55103819&CFTOK
EN=67618896, and Nasir Memon.
Watermarking and Ownership Problem: A Revisit
. Rep. 2005.
Web. 28 Sept. 2009. <http://delivery.acm.org/10.1145/1110000/1102563/p93
-
sencar.pdf?key1=1102563&key2=9910614521
&coll=GUIDE&dl=GUIDE&CFID=55103819&CFTOK
EN=67618896>. [This paper focuses on legal aspects and tries to resolve problems with image
forgery and theft. It goes over topics to help prevent theft with different types of Watermarking
techniques.]



Yeung, Minerv
a M., Scott A. Craver, Nasir Memon, and Boon
-
Lock Yeo.
Resolving Rightful
Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications
. Rep.
May 1998. Web. 28 Sept. 2009.
<http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber
=668979&isnumber=14639>.

[This paper focuses only on invisible watermarking and whic
h techniques are best. It also talks
about the “ends” to watermarking and how it can be used in the real world.]