|
[1] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital watermark,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 86-90, 1994. [2] G. Voyatzis and I. Pitas, “Applications of total automorphisms in image watermarking,” Proceedings of IEEE International Conference on Image Processing (ICIP’96), Lausanne, Switzerland, Vol. 2, pp. 237-240, September 16-19, 1996. [3] J. Fridrich, “Robust bit extraction form images,” Proceedings of IEEE ICMCS’99 Conference, Florence, Italy, June 7-11, 1999. [4] W. Bender, N. Morimoto, and D. Gruhl, “Method and apparatus for data hiding in images,” U. S. Patent, No. 5689587, 1997. [5] C. Y. Yin and W. H. Tsai, “Copyright and annotation protection in digital museums by using data hiding, watermarking, and image authentication techniques,” M. S. Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China, June 2001. [6] N. Chotikakamthorn and S. Pholsomboon, “Ring-shaped digital watermark for rotated and scaled images using random-phase sinusoidal function,” Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology, Singapore, Vol. 1, pp. 321-325, August 19-22, 2001. [7] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. on Image Processing, Vol. 6, no. 12, pp. 1673-1687, 1997. [8] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, Vol. 66, pp. 357-372, 1998. [9] C. T. Hsu and J. L. Wu, "DCT-Based watermarking for video," IEEE Transactions on Image Processing, Vol. 8, pp. 58-68, 1999. [10] S. D. lin and C. F. Chen, “A Robust DCT-Based Watermarking for copyright Protection,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415-421, August 2000. [11] J. J. K. O'Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital image watermarking,” Proceedings of IEEE International Conference on Image Processing, Santa Barbara, CA USA, Vol. 1, pp. 536-539, Oct. 26-29, 1997. [12] M. Wu and M. L. Miller, J. A. Bloom, and I. J. Cox, “A rotation, scale and translation resilient public watermark,” Proceedings of 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing, Phoenix, AZ USA, Vol. 4, pp. 2065, March 15-19, 1999. [13] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y.M. Lui, “Rotation, scale, and translation resilient watermarking for images,” IEEE Transactions on Image Processing, Vol. 10, Issue 5, pp. 767-782, May 2001. [14] D. J. Fleet and D. J. Heeger, “Embedding invisible information in color images,” Proceedings of IEEE International Conference on Image Processing, Santa Barbara, CA USA, Vol. 1, pp. 532-535, Oct. 26-29, 1997. [15] V. Solachidis and L. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE Transactions on Image Processing, Vol. 10, Issue 11, pp. 1741-1753, Nov. 2001. [16] P. C. Su and C. C. Kuo, “An Image Watermarking Scheme to Resist Generalized Geometrical Transformations,” Proceedings of SPIE Conference on Multimedia Systems and Applications III, Boston, Massachusetts, Vol. 4209, pp. 354-365, November 5-8, 2000. [17] F. Lefebvre, A. Gueluy, D. Delannay, and B. Macq, “A print and scan optimized watermarking scheme,” Proceedings of 2001 IEEE Fourth Workshop on Multimedia Signal Processing, Cannes, France, pp. 511-516, Oct. 3-5, 2001. [18] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” in Proc. IEEE International Conference on Image Processing, Vol. II, 1997, pp. 680-683. [19] J. Fridrich, “Image watermarking for tamper detection,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 404-408, 1998. [20] P. W. Wong, “A public key watermark for image verification and authentication,” Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 455-459, 1998. [21] D. C. Wu and W. H. Tsai, “Embedding of any type of data in images based on a human visual model and multiple-based number conversion,” Pattern Recognition Letter, Vol. 20, pp. 1511-1517, 1999. [22] M. Wu and B. Liu, “Watermarking for image authentication,” Proceedings of IEEE International Conference on Image Processing, Chicago, Illinois, Vol. 2, pp. 437-441, October 1998. [23] Y. J. Cheng and W. H. Tsai, “Copyright and Integrity Protection for Images by Removable Visible Watermarking Techniques,” M. S. Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, Republic of China, June 2002. [24] http://www.ph.tn.tudelft.nl/Courses/FIP/noframes/fip-Properti-2.html, Properties of Fourier Transforms. [25] A. Navarro and J. Tavares, “Joint Source-Channel PCM Image Coding for Binary Symmetric Channels”, Proceeding of International Conference on Signal Processing Applications and Technology, Orlando-USA, 1999. [26] J. O'Ruanaidh, W. J. Dowling, and F. M. Boland, “Phase watermarking of digital images,” Proceeding of ICIP’96, Lausanne, Switzerland, vol. 3, pp. 239–242, Sept. 1996. [27] R.C. Gonzalez and R. E. Woods, “Digital Image Processing,” second edition, pp. 155, 2002. [28] C. Y. Lin and S. F. Chang, “Distortion Modeling and Invariant Extraction for Digital Image Print-and-Scan Process,” Proceeding of International Symposium on Multimedia Information Processing (ISMIP), Taipei, Taiwan, Dec. 1999.
|