|
Bibliography [1]C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks In Images,” IEEE Transactions on Image Processing, Vol. 8, pp. 58-68, 1999. [2]C. T. Hsu and J. L. Wu, “Multi-resolution Watermarking For Digital Images,” IEEE Transactions on Circuits and System II: Analog and Digital Signal Procedure, Vol. 45, pp. 1097-1101, 1998. [3]I. Pitas, “A Method For Watermark Casting On Digital Image,” IEEE Transactions on Circuits and video technique, Vol. 8, pp. 1097-1101, 1998. [4]R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models Through Geometric And Topological Modifications,” IEEE Transactions on Selected Areas in Communications, Vol. 16, pp. 551-560, 1998. [5]C. L. Podilchuk, Z. Wenjun, “Image-Adaptive Watermarking Using Visual Models,” IEEE Transactions on Selected Areas in Communications, Vol. 16, pp. 525-539, 1998. [6]C. Busch, W. funk, and S. Wolthusen, “An Adaptive Digital Image Watermarking Technique For Copyright Protection,” IEEE Truncations on Consumer Electronics, Vol. 45, pp. 1005-1015, 1999. [7]M. S. Hwang, C. C. Chang, and K. F. Hwang, “A Watermarking Technique Based On One-Way Hash Functions,” IEEE Truncations on Consumer Electronics, Vol. 45, pp. 286-294, 1999. [8]K. S. Ng, L. M. Cheng, and M. K. Wong, “Adaptive Watermarking By Using Pixel Position Shifting Technique,” IEEE Truncations on Consumer Electronics, Vol. 45, pp. 1057-1064, 1999. [9]Z. H. Wei, O. Qin, and Y. Q. Fu, “Perceptual Digital Watermarking of Images Using Wavelet Transform,” IEEE Truncations on Consumer Electronics, Vol. 44, pp. 1267-1272, 1998. [10]C. T. Hsu and J. L. Wu, “DCT-Based Watermarking For Video,” IEEE Truncations on Consumer Electronics, Vol. 44, pp. 206-216, 1998. [11]M. P. Queluz, “Towards Robust Content Based Technique For Image Authentication,” IEEE Multimedia Signal Processing, 1998, pp. 297-302. [12]P. W. Wong, “A Public Key Watermark For Image Verification And Authentication,” ICIP Image Processing, Vol. 1, pp. 455-459, 1998. [13]S. Bhattacharjee and M. Kutter, “Compression Tolerant Image Authentication,” ICIP Image Processing, Vol. 1, pp. 437-441, 1998. [14]M. Wu and B. Liu, “Watermarking For Image Authentication,” ICIP Image Processing, Vol. 2, pp. 437-441, 1998. [15]C. R. Yang, M. S. Hwang, and Y. L. Tang, “Tampering Double Detection Algorithm,” Eighth National Conference on Science and Technology of National Defense, Tao-Yuan, Nov. 1999. [16]G. L. Friedman, “The Trustworthy Digital Camera: Restoring Credibility To The Photographic Image,” IEEE Transactions on Consumer Electronics, Vol. 39, no. 4, pp.905-910, November 1993. [17]P. W. Wong, “A Public Key Watermark For Image Verification and Authentication,” IEEE International Conference on Multimedia Computing and Systems, Vol. 2, pp. 209-213, October 1998. [18]M. Schneider and S. F. Chang, “A Robust Image Content Based Digital Signature For Image Authentication,” International Conference on Image Processing, Vol. 3, pp. 227-230, September 1996. [19]D. Kundur and D. Hatzinakos, “Digital Watermarking For Telltale Tamper Proofing And Authentication,” Proceedings Of The IEEE, Vol. 87, no. 7, JULY 1999. [20]R. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120-126, February 1978. [21]W. B. Pennebaker and J. L. Mitchell, JPEG: Still Image Data Compression Standard, New York, Van Nostrand Reinhold, 1993.
|