|
【1】M. Boliek, C. Christopoulos, and E. Majani, “JPEG2000 Final Committee Draft SC29WG1 N 1646,” ISO/IEC JTC1/SC29/WG1 N1646R, Apr. 2000. 【2】ISO/IEC, ISO/IEC 15444-1, Information technology-JPEG2000 image coding system, Apr. 2000. 【3】M. Rabbani and D. S. Cruz, “The JPEG 2000 Still-Image Compression Standard,”the 2001 International Conference in Image Processing (ICIP), Thessaloniki, Greece, Oct. 2001. 【4】C. Christopoulos, A. Skodras, and T. Ebrahimi, “The JPEG2000 still image coding system: an overview,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 4, pp. 1103-1127, Nov. 2000. 【5】J. Fridrich, “Security of fragile authentication watermarks with localization,” SPIE Photonic West, San Jose, CA, 2002, pp. 691-700, May 2002. 【6】J. Fridrich and M. Goljan, “Images with Self Capabilities,” Image Processing, 1999, vol.3, pp. 792-796, Oct. 1999. 【7】S. Yafei, Z. Li, G. Wu and X. Lin, “Reconstruction of Missing Blocks In Image Transmission by Using Self-Embedding,” Intelligent Multimedia, Video and Speech Processing, 2001, pp. 535-538, May 2001. 【8】F.H. Yeh and Greg C. Lee, “Toral Fragile Watermarking for Image Authentication with Localization,” International Conference on SIGNAL AND IMAGE PROCESSING 2004, pp. 444-268, Oct. 2004. 【9】H.H. Yu and P. Yin, “Multimedia data recovery using information hiding,” Global Telecommunications Conference, 2000. GLOBECOM’00. IEEE, vol.3, pp, 1344-1348, Oct. 2002. 【10】C. Y. Lin and S.F. Chang, “Semi-Fragile Watermarking for JPEG Visual Content,” in Proc. SPIE Security Watermarking Multimedia Contents II, San Jose, CA, 2000. 【11】C. Y. Lin and S.F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation” IEEE Transactions on Circuits of Video Technology, Vol. 11, No. 2, Feb. 2001 【12】P. Meerwald, “Quantization watermarking in the JPEG2000 coding pipeline,” Communications and Multimedia Security Issues of The New Century, IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security, pp. 69-79, May 2001. 【13】R. Grosbois, P. Gerbelot, and T. Ebrahimi, Authentication and access control in the JPEG 2000 compressed domain,” In Proc. of the SPIE 46th Annual Meeting, Applications of Digital Image Processing XXIV, San Diego, July 29th August 3rd, 2001. 【14】J. Chen, T.S. Chen and J.G. Chen, “Efficient sub-band coding in JPEG2000 for improved authentication and tamper-proofing,” The Imaging Science Journal Vol. 52 no. 3 , Sep. 2004. 【15】DEEPA KUNDUR, “Digital Watermarking for Telltale Tamper Proofing and Authentication,” Proceedings of the IEEE, Vol. 87, Issue 7, pp. 1167-1180, July 1999. 【16】K. Sayood, “Introduction to Data Compression-2nd edition,” 2000. 【17】C. J. Lian, K. F. Chen, H. H. Chen, and L. G. Chen, “Lifting Based Discrete Wavelet Transform Architecture for JPEG2000,” the 2001 IEEE International Symposium on Circuits and Systems, Vol. 2, pp. 445-448, May 2001. 【18】D. Taubman, “High Performance Scalable Image Compression with EBCOT,” IEEE Transactions on Image Processing, Vol. 9, No. 7, pp. 1158-1170, Jul. 2000. 【19】http://www.jpeg.org/JPEG2000.html 【20】http://coecs.ou.edu/cheung/www/Images/JPEG2000/jpeg2000.html 【21】D. S. Taubman and M. W. Marcellin, “JPEG2000 Image Compression Fundamentals, Standards and Practice,” 2002. 【22】Tinku Acharya, “JPEG2000 Standard for Image Compression : Concepts, Algorithms and VLSI Architec.,” 2004. 【23】L.K. Chen, K.Y. Lau and Y. Trisno, “Frequency planning for nonlinear distortion reduction in wideband transmission,” Electronics Letters, Vol. 27, Issue 14, pp. 1293-1295, 1999. 【24】Forouzan, Behrouz A “Data communications and networking,” 2004. 【25】吳炳飛、胡益強、瞿忠正,蘇崇彥,“JPEG2000影像壓縮技術”,全華科 技圖書股份有限公司,2003。 【26】張真誠、黃國峰、陳同孝,“電子影像技術”,旗標出版股份有限公司,2003。 【27】陳同孝、張真誠、黃國峰,“數位影像處理技術”,旗標出版股份有限公司, 2003。 【28】林銀議,”錯誤保護及訂正碼”,國立中央大學,2004. 【29】JJ2000, “JJ2000 An introduction to the software,”http://jpeg2000.epfl.ch.
|