|
[1]Chin-Chen Chang, Ju-Yuan Hsiao, and Chi-Lung Chiang, "An Image Copyright Protection Scheme Based on Torus Automorphism," Proceeding of the First International Symposium on Cyber Worlds, pp. 217-224, November 2002. [2]Chin-Chen Chang and Jun-Chou Chuang, "An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy," Pattern Recognition Letters of Elsevier Science Inc., Vol.23, Issue 8, pp. 931-941, June 2002. [3]G. Voyatzis and I. Pitas, "Applications of Toral Automorphisms in Image Watermarking," IEEE Proceedings of International Conference on Image Processing, Vol.1, pp. 237-240, September 1996. [4]Chuen-Ching Wang, Shen-Chuan Tai, and Chong-Shou Yu, "Repeating Image Watermarking Technique by the Visual Cryptography," IEICE Transactions of Fundamentals, Vol.E83-A, No.8, August 2000. [5]Ping Wah Wong and Nasir Memon, "Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification," IEEE Transactions on Image Processing, Vol.10, No.10, October 2001. [6]Shinfeng D. Lin and Chin-Feng Chen, "A Robust DCT-based Watermarking for Copyright Protection," IEEE Transaction of Consumer Electronics, Volume 46, Issue 3, pp. 415-421, August 2000. [7]Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on Image Processing, Vol.16, No.12, December 1997. [8]Shang-Lin Hsieh and Bin-Yuan Huang, "A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation," Proceedings of International Computer Symposium, pp. 661-666, December 2004. [9]Shang-Lin Hsieh, Hsuan-Chieh Huang, and I-Ju Tsai, "A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images," IEEE Conference on Information Technology: New Generations, pp. 482-489, April 2006. [10]Ming-Shing Hsieh, Din-Chang Tseng, and Yong-Huai Huang, "Hiding Digital Watermarks Using Multi-resolution Wavelet Transform," IEEE Transactions on Industrial Electronics, Vol.48, No.5, October 2001. [11]Xiangui Kang, Jiwu Huang, Yun Q. Shi, and Yan Lin, "A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression," IEEE Transaction on Circuits and Systems for Video Technology, Vol. 13, No.8, August 2003. [12]Joseph J. K. O Ruanaidh and Shelby Pereira, "A Secure Robust Digital Image Watermark," SPIE Proceedings of Electronic Imaging: Processing, Printing and Publishing in Color, pp. 150-163, May 1998. [13]Shelby Pereira and Thierry Pun, "Robust Template Matching for Affine Resistant Image Watermarks," Proceeding of 3rd International Information Hiding Workshop, pp. 207–218, September 1999. [14]Joseph J. K. O Ruanaidh and Thierry Pun, "Rotation, Scale and Translation Invariant Digital Image Watermarking," IEEE Proceeding of Internal Conference on Image Processing, pp. 536-539, October 1997. [15]Ching-Yung Lin, Min Wu, Jeffrey A. Bloom, Ingemar J. Cox, Matt L. Miller, and Yui Man Lui, "Rotation, Scale, and Translation Resilient Watermarking for Images," IEEE Transactions on Image Processing, Vol. 10, No. 5, May 2001. [16]Harold S. Stone, Bo Tao, and Morgan McGuire, "Analysis of Image Registration Noise Due to Rotationally Dependent Aliasing," Technique Report of NEC Research Institute, TR 98-018, 1998. [17]Moni Naor and Adi Shamir, "Visual Cryptography," Advances in Cryptology Eurocrypt'94, pp. 1-12, Springer-Verlag, Berlin, 1995. [18]Bin-Yuan Huang and Shang-Lin Hsieh, "A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation," Master Thesis, Tatung University, July 2004 [19]Hsuan-Chieh Huang and Shang-Lin Hsieh, "A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint Images," Master Thesis, Tatung University, July 2005 [20]Stirmark benchmark, http://www.petitcolas.net/fabien/watermarking/stirmark/. [21]USC-SIPI image database, http://sipi.usc.edu/database/.
|