|
[1]A. Z. Tirkel, G. Rankin, R. Van Schyndel, W. Ho, N. Mee, and C. F. Osborne, "Electronic watermark," Digital Image Computing, Technology and Applications (DICTA’93), pp. 666-673, 1993. [2]S. P. Mohanty, "Digital watermarking: A tutorial review," http://www.csee.usf.edu/~smohanty/research/Reports/WMSurvey1999Mohanty.pdf, 1999. [3]S.P.Mohanty, et al., ”A Dual Watermarking Technique for Images”, Proc. 7th ACM International Multimedia Conference, ACM-MM’99, Part 2, pp. 49-51, Orlando, USA, Oct. 1999. [4]Kundur, D., Hatzinakos, D.: ‘Digital watermarking for telltale tamperproofing and authentication’, Proc. IEEE, 1999, 87, (7), pp. 1167–1180 [5]Lu, H.-T., Shen, R.-M., Chung, F.-L.: ‘Fragile watermarking scheme forimage authentication’, Electron. Lett., 2003, 39, (12), pp. 898–900 [6]He, H.-J., Zhang, J.-S., Chen, F.: ‘Adjacent-block based statisticaldetection method for self-embedding watermarking techniques’, Signal Process., 2009, 89, (8), pp. 1557–1566 [7]I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, 1997. [8]V. Guzman, M. N. Miyatake, and H. M. P. Meana, "Analysis of a wavelet-based watermarking algorithm," in Electronics, Communications and Computers, 2004. CONIELECOMP 2004. 14th International Conference on, 2004, pp. 283-287. [9]A. Pomerleau, "A real-data FFT algorithm for image processing applications," Canadian Electrical Engineering Journal, vol. 8, pp. 65-72, 1983. [10]M. C. Hernández, M. N. Miyatake, and H. P. Meana, "Analysis of a DFT-based watermarking algorithm," in Electrical and Electronics Engineering, 2005 2nd International Conference on, 2005, pp. 44-47. [11]S. Katzenbeisser and F. Petitolas, "Information hiding techniques for steganography and digital watermaking," DNA, vol. 28, 2004. [12]呂慈純, "The Study of Information Hiding Mechanisms",朝陽科技大學,2007,pp. 2. [13]N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE computer, vol. 31, pp. 26-34, 1998. [14]王韻慈,"淺談近代造紙工藝變革對鈔券印刷之影響"。Available: http://www.cepp.gov.tw/TheFiles/publication/d3ae435a-9a12-42bc-8d92-92898b1e7caf.pdf [15]鈔票浮水印, Available: http://mypaper.pchome.com.tw/ycamptw/post/1320218922 [16]Lin, P.-L., Hsieh, C.-K., Huang, P.-W.: ‘A hierarchical digital watermarking method for image tamper detection and recovery’, Pattern Recognit., 2005, 38, pp. 2519–2529 [17]N. Lazarov and Z. Ilcheva, "A fragile watermarking algorithm for image tamper detection based on chaotic maps," in 2016 IEEE 8th International Conference on Intelligent Systems (IS), 2016, pp. 723-728. [18]K. C. Liu, "Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique," IET Image Processing, vol. 8, pp. 363-372, 2014. [19]Tsai, W.-H.: ‘Moment-preserving thresholding: a new approach’, Comput. Vis. Graph. Image Process., 1985, 29, pp. 377–393 [20]N. F. Johnson and S. Jajodia, "Exploring steganography: Seeing the unseen," IEEE computer, vol. 31, pp. 26-34, 1998. [21]詹永寬,"光與色彩"。Available: web.nchu.edu.tw/pweb/users/ykchan/lesson/9079.ppt [22]張家寧與蔡文祥, "普遍化「富含信號藝術」編碼影像 ─ 一種可做有效率低扭曲資料傳輸的新媒體型態",國立交通大學機構典藏,2015,pp. 35-36. [23]國立中央大學,"人類知覺系統"。Available: http://ip.csie.ncu.edu.tw/course/VR/VR1102p.pdf [24]YUV , Available: https://en.wikipedia.org/wiki/YUV [25]24 , Available: https://en.wikipedia.org/wiki/Taxicab_geometry [26]N. Lazarov and Z. Ilcheva, "A fragile watermarking algorithm for image tamper detection based on chaotic maps," in 2016 IEEE 8th International Conference on Intelligent Systems (IS), 2016, pp. 723-728. [27]Chaotic maps , Available: https://en.wikipedia.org/wiki/List_of_chaotic_maps [28]Arnold's cat map - Wikipedia, Available: https://en.wikipedia.org/wiki/Arnold%27s_cat_map [29]Arnold's cat map – Jason Davies , Available: https://www.jasondavies.com/catmap/ [30]Cat map , Available: http://www.chaos.umd.edu/misc/catmap.html [31]C.-K. Chan and L.-M. Cheng, "Hiding data in images by simple LSB substitution," Pattern recognition, vol. 37, pp. 469-474, 2004. [32]Digital Image Processing, 3rd Edition, Gonzalez and Woods, Prentice Hall, 2008. [2nd Edition , 2002] 【中譯本:[2051A3] 數位影像處理,繆紹綱 譯,高立圖書,2009 】
|