|
7, 1994, pp. 308-332. [18]J. Fridrich, and M. Goljan, “Images with Self-correcting Capability,” Proceedings of IEEE International Conference on Imaging Processing, Kobe, Japan, Oct. 1999, pp. 792-796. [19]G. Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, Vol. 39, Nov. 1993, pp. 905-910. [20]D. E. Goldberg, Genetic Algorithm in Search, Optimization and Machine Learning, MA, Addison Wesley, 1989. [21]R. C. Gonzalez and R. E. Woods, Digital Image Processing, Addison Wesley, 1992. [22]J. H. Holland, Adaptation in Natural and Artificial Systems, Ann Arbor, University of Michigan, 1975. [23]C. T. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vol. 8, No. 1, Jan. 1999, pp. 58-68. [24]A. E. Jacquin, “Image Coding Based on a Fractal Theory of Iterated Contractive Image Transformations, “ IEEE transactions on Image Processing, Vol. 1, No. 1, 1992, pp. 18-30. [25]M. Kutter, F. Jordan, and F. Bossen, “Digital Watermarking of Color Images Using Amplitude Modulation,” Journal of Electronic Imaging, Vol. 7, No. 2, Apr. 1998, pp. 326-332. [26]M. D. Lema and O. R. Mitchell, “Absolute Moment Block Truncation Coding and Its Applications to Color Images,” IEEE Transactions on Communications, Vol. COM-32, Oct. 1984, pp. 1148-1157. [27]T. W. Lin, “Compressed Quadtree Representations for Storing Similar Images,” Image and Vision Computing, Vol. 15, 1997, pp. 883-843. [28]S. Low and N. Maxemchuk, “Performance Comparison of Two Text Marking Method,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 1017-1024,. [29]N. Naor and A. Shamir, “Visual Cryptography,” Advances in Cryptography: Eurocrypt′94, Springer-Verlag, Berlin, 1995, pp. 1-12. [30]R. Ohbuvhi, H. Masuda, and M. Aono, “Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications,” IEEE Journal on Selected Areas in Communications, Vol. 16, No, 4, 1998, pp. 551-560. [31]A. Piva, M. Barni, F. Bartolini, and V. Cappellini, “Exploiting the Cross-correlation of RGB-channels for Robust Watermarking of Color Images,” Proceedings of 6th IEEE International Conference on Image Processing ICIP99, Japan, Vol. 1, Oct. 1999, pp. 306-310. [32]R. L. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public-key Crytosystems,” Communications of the ACM, Vol. 21, Feb. 1996, pp. 120-126. [33]B. Schneier, Applied Cryptography, Second Ed., Wiley & Sons, 1996. [34]M. Schneider and S. F. Chang, “A Robust Image Content Based Digital Signature for Image Authentication,” Proceedings of the International Conference on Image Processing, Vol. 3, Lausanne, Switzerland, Sep. 1996. pp. 227-230. [35]M. D. Swason, M. Kobayashi, and A. H. Tewfik, “Multimedia Data Embedding and Watermarking Techniques,” Proceedings of the IEEE, Vol. 86, No. 6, Jun. 1998, pp. 1064-1087. [36]S. C. Tai, W. J. Chen and P. J. Cheng, “Genetic Algorithm for Single Bit-Map AMBTC Coding of Color Images,” Optical Engineering, Vol. 37, No. 9, 1998, pp. 2483-2490. [37]G. Voyatzis and I. Pitas, “Protection Digital Image Copyrights: A Framework,” IEEE Computer Graphics and Applications, Vol. 1, 1999, pp.18-24. [38]S. Walton, “Image Authentication for a Slippery New Age,” Dr. Dobbe’s Journal, vol. 20, Apr. 1995, pp. 18-26. [39]R. B. Wolfgang and E. J. Delp, “A Ownership for Digital Image,” Proceedings of the 1996 International Conference on Image Processing, Lausanne, Switzerland, Vol. 3, Sep. 16-19, 1996, pp. 219-222. [40]P. Wong, “A Watermark for Image Integrity and Ownership Verification,” Final Program and Proceedings of the IS&T PICS99, Savanna, Georgia, Apr. 1999, pp. 374-379. [41]M. Wu and B. Liu, “Watermarking for Image Authentication,” Proceedings of the IEEE International Conference on Image Processing, Vol. 2, Chicago, Illinois, Oct. 1998, pp. 437-441. [42]C. R. Yang, M. S. Hwang and Y. L. Tang, “Tampering Double Detection Algorithm,” Proceedings of the Eighth National Conference on Science and Technology of National Defense, Tao-Yuan, Taiwan, Nov. 1999, pp. 165-170.
|