|
[1] A. Said and W. A. Pearlman, “A new, fast and efficient image code based on set partitioning in hierarchical trees,” IEEE Trans. On Circuits and Systems for Video Technology, vol. 18,no. 6,pp. 891-898,June 2000. [2] K.T. Lay and L.J. Wang, “Packetization and unequal erasure protection for transmission of SPIHT-encoded images,” IEICE Trans. On Communications, vol. E97-B,no. 1,pp. 226-237, January 2014. [3] 周佳怡, ‘‘用於SPIHT影像封包之不等錯誤保護傳輸技術,’’ 國立台灣科技大學電子工程研究所, 2011. [4] K.C Liu, “Self-embedding watermarking scheme for colour images by bi-level moment-preserving technique,” IET image Processing, vol. 8, iss. 6,pp. 363-372, June 2014. [5] T.Y. Lee and S.D. Lin, “Dual watermark for image tamper detection and recovery,” ELSEVIER Pattern Recognition, vol. 41, iss. 11,pp. 3497-3506, November 2008. [6] P.L. Lin,C.K. Hsieh and P.W. Huang, “A hierarchical digital watermarking method for image tamper detection and recovery,” ELSEVIER Pattern Recognition, vol. 38, iss. 12, pp. 2519-2529, December 2005. [7] S.B. Chaluvadi and M.V.N.K. Prasad, “Efficient image tamper detection and recovery technique using dual watermark,” Proc. IEEE Int. Conf. Nature & Biologically Inspired Computing, 2009. NaBIC 2009. World Congress on, vol. 1, pp. 993-998, Dec. 2009.
[8] N. Wang and C.H. Kim, “Tamper detection and self-recovery algorithm of color image based on robust embedding of dual visual watermarks using DWT-SVD,” Proc. IEEE Int. Conf. Communications and Information Technology, 2009. ISCIT 2009. 9th International Symposium on, vol. 1, pp. 157-162, Sept. 2009. [9] Q. Song and H.B. Zhang, “Image tamper detection and recovery using dual watermark,” Proc. IEEE Int. Conf. Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on, vol. 1,pp. 1-4 , Sept. 2010. [10] M.J. Chen and X.B. Sun, “A digital image watermarking of self-recovery base on the SPIHT algorithm,” Proc. IEEE Int. Conf. Signal Processing Systems (ICSPS), 2010 2nd International Conference on, vol. 2,pp. 621-624, July 2010. [11] R.C. Gonzalez and R.E. Woods, “Digital Image Processing third edition,” Prentice Hall, 2008 [12] “Information technology – automatic identification and data capture techniques – bar code symbology – QR code, ”International Standard ISO/IEC 18004, ISO/IEC, 2006
|