|
參考文獻
[1]F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of IEEE, vol. 87, no. 7, pp. 1079-1107, 1999. [2]G. Voyatzis and I. Pitas, “The use of watermarks in the protection of digital multimedia products,” Proceedings of the IEEE, vol. 87, no.7, pp. 1197-1207, 1999. [3]K. M. Passino, “Biomimicry of bacterial foraging,” IEEE Control Systems Magazine, vol. 22, no. 3, pp.52-67, June, 2002. [4]R. G. Schyndel, A. Z. Tirkel and C. F. Osborne, “A digital watermark,” in Proc IEEE Int. Conf. Image Processing, vol. 2 pp.86-90, 1994. [5]W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol.35, no.3&4, pp. 313-336, 1996. [6]R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol.34, no.3, pp.671-683, 2001. [7]A. Leest, M. Veen, and F. Bruekers, “Reversible image watermarking,” IEEE International Conference on Image Processing, vol.2, pp.731-734, 2003. [8]B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, “Reversible image watermarking by histogram modification for Integer DCT coefficients,” IEEE Workshop on Multimedia Signal Processing, pp.143-146, 2004. [9]Z. Ni, Y. Q. Shi, Nirwan Ansari, and Wei Su, “Reversible Data Hiding,” IEEE Trans. on Circuits and Systems for Video Technology, vol.16, no.3, pp.354-362, March 2006 [10]D. Coltuc, A. Tremeau, E. J. Delp and P. W. Wong, “Simple Reversible watermarking Schemes,” Proceedings of SPIE: Steganography, watermarking Multimedia Contents VII, vol.5681, pp.561-568, 2005. [11]D. C. Wu and W. H. Tsai, “Image hiding in spatial domain using an image differencing approach,” IEEE Proceedings, Image and Signal Processing, vol.147, no.1, pp. 29-37, 2000. [12]J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. on Circuits and systems for Video Technology, vol.13, no.8 August 2003 [13]C. C. Thien and J. C. Lin, “A simple and high-hiding capacity medhod for hiding digit- by digit data in images based on modulus function,” Pattern Recognition, vol.36, no.3, pp.2875-2881, 2003. [14]A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Trans. Image Processing, vol.13, no.8, pp.1147-1156, August 2004. [15]I. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, December 1997. [16]C.I. Podilchuk, and W. Zeng, “Image-adaptive Watermarking Using Visual Models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp.525-539, May, 1998 [17]C. T. Hsu, and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transsactions on Image Processing, vol. 8, no. 1, 1999. [18]I. J. Cox, J. Kilian, F.T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, issue: 12, pp.1673-1687, 1997. [19]W. Luo, G. L. Heileman and C. E. Pizano, “Fast and robust watermarking of JPEG files,” Proceedings of Image Analysis and Interpretation, vol. 1, pp.158-162, 2002 [20]C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, vol.2 no.4, pp.209-224, December, 2000. [21]M. J. Tsai, K. Y. Yu and Y. Z. Chen, “Joint wavelet and spatial transformation for digital watermarking,” IEEE trans. on Consumer Electronics, vol.46 no.1, pp.241-245, February, 2000. [22]M. S. Hsieh, D. C. Tseng, and Y. H. Huang, “Hiding digital watermarks using multiresolution wavelet transform,” IEEE Trans. on Industrial Electronics, vol.48, no.5, pp.875-882, 2001. [23]W. B. Lee, T. H. Chen, “A public verifiable copy protection technique for still images,” The Journal of systems and Software, pp.195-204, 2002. [24]F.A.P. Peticolas, R.j. Adnerson, “Attacks on copyright marking systems,” in Second International Information Hiding Workshop, pp. 219-239, 1998. [25]F.A.P. Peticolas, R.j. Adnerson, “Evaluation of copyright marking systems,” 1999 IEEE International Conterence on Multimedia Compution and Systems, vol.1, pp.574-579, 1999. [26]L. A Zadeh, “Fuzzy Sets,” Information and Control, vol.8. 338-353, 1965.
|