|
[1]Hood, A.A. and Janwe, N.J., “Robust Video Watermarking Techniques and Attacks on Watermark – A Review, International Journal of Computer Trends and Technology, Vol.4, No.1,pp.30-33 , 2013. [2]Zhou Zude, Ai Qingsong, and Liu Quan, “A SVD-based Digital Watermarking Algorithm for 3D Mesh Models, The 8 th International Conference on Signal Processing, Piscataway, Vol.4, pp.16-20, 2006. [3]張真誠、黃國峰、陳同孝,電子影像技術(Electronic Imaging Techniques),松崗電腦 圖書資料股份有限公司,2000 年 12 月. [4]Zainab J. Ahmed and Loay E. George , “Robust Watermarking for Video Using Mean Modulation Technique, Iraqi Journal of Science, Vol. 58, No.4C, pp. 2412-2426, January 2017. [5]Zainab J. Ahmed and Loay E. George , “Robust Watermarking for Video Using Modulation Technique on RGB Domain, British Journal of Applied Science & Technology, Vol. 14, No.1,pp. 1-10, 2016. [6]https://www.axis.com/en-us/learning/web-articles/technical-guide-to-network-video/video-compression [7]陳同孝、張真誠、黃國峰,數位影像處理技術(Digital Image Processing Techniques), 松崗電腦圖書資料股份有限公司,2001 年 1 月. [8]Chun-Shien Lu, Hong-Yuan Mark Liao, “Multipurpose Watermarking for Image Authentication and Protection, IEEE Trans. Image Processing, Vol.10, pp. 1579-1592,2001. [9]Sabu Emmanuel and Mohan S. Kankanhalli, “ Mask-based interactive watermarking protocol for video, Proceedings of SPIE, Vol. 4518,pp.247-258, 2001. [10]黃國峰 ,張真誠 ,黃明祥 ,漫談數位浮水印技術 ,資訊安全通訊 , 第五卷第四期 , 頁11-17,September 1999. [11]Iain E. Richardson,The H.264 Advanced Video Compression Standard,Wiley Publication, 2010. [12]Tanima Dutta ,“Robust Compressed Domain Video Watermarking for H.264/AVC , Indian Institute of Technology Guwahati 781039 ,pp.2-136 ,2014. [13]Nasir D. Memon and Ping Wah Wong, Protectig digital media cotent, Communications of the ACM, Vol.41,No.7,pp.35-43, July 1998. [14]Marwen Hasnaoui,“MPEG-4 AVC stream watermarking, Cryptography and Security. InstitutNational des Télécommunications, 2014. English. [15]Stéphane Bounkong, Borémi Toch, David Saad,and David Lowe, “ICA for Watermarking Digital Images, The Journal of Machine Learning Research, Vol.4,No.7-8, pp.1471-1498, January 2003. [16]Min-Shiang Hwang, Chin-Chen Chang,and Kuo-Feng Hwang, “A Watermarking Technique Based on One-Way Hash Functions, IEEE Transactions on Consumer Electronics, vol. 45 , no. 2,pp. 286-294, May 1999. [17]Chun-Shien Lu, and Hong-Yuan Mark Liao,“Structural digital signature for image authentication: An Incidental Distortion Resistant Scheme, IEEE Transactions on Multimedia, vol. 5, no. 2,pp.161-173, Jun. 2003. [18]J. Mielikainen, “LSB matching revisited, IEEE Signal Processing Letters, Vol.13, No.5, pp. 285-287, May 2006. [19]A. Mansouri, A.M. Aznaveh,F.T. Azar, and F. Kurugollu. “A Low ComplexityVideo Watermarking in H.264 Compressed Domain,IEEE Transaction on Information Forensics and Security, vol.5,no.4,pp.649-657, 2010. [20]李淑芝,张翔,邓小鸿,吴晓燕,一種抗重壓縮的 H.264/AVC視頻水印算法,江西理工大学,信息工程学院,应用科学学院,江西赣州341000. [21]https://read01.com/zh-tw/KBKPG5.html#.W1DDo9IzadG [22]David Salomon and Giovanni Motta,Handbook of data compression, Springer 5th Edition,2010.
|