|
[1] Project Gutenberg. <http://www.promo.net/pg/> [2] J. Meng and S.-F. Chang, “Embedding visible video watermarks in the compressed domain,” in ICIP ‘98. <http://clip.informatik.uni-leipzig.de/~toelke/Watermark.html> [3] M. Kutter, F. Jordan, and F. Bossen, “Digital signature of color images using amplitude modulation,” in Proc. SPIE-EI97, 1997, pp. 518-526. <http://ltswww.epfl.ch/~kutter/publications/amt.html> [4] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding.” IBM Systems Journal, vol. 35, no. 3?, 1996, pp. 313-336. <http://www.almaden.ibm.com/journal/sj/mit/sectiona/bender.html> [5] I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no.12, pp. 1673-1687, Dec. 1997. [6] Tae-Yun Chung, Min-Suk Hong, Young-Name Oh, Dong-Ho Shin, and Sang-Hui Park, “Digital watermarking for copyright protection of MPEG2 compressed video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 3, pp. 895-901, Aug. 1998. [7] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia data-embedding and watermarking technologies,” Proceedings of the IEEE, vol. 86, no. 6, pp. 1064-1087, June 1998. [8] C. H. Chou and Y. C. Li, “A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 5 no. 6, pp. 467-476, Dec. 1995 [9] R. J. Anderson, F. A. P. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, Special Issue on Copyright & Privacy Protection, vol. 16 no. 4, pp. 474-481, May 1998. <http://www.cl.cam.ac.uk/~fapp2/papers/jsac98-limsteg/JSAC98-LimSteg.html> [10] B Pfitzmann, “Information hiding terminology,” in Information Hiding, Springer Lecture Notes in Computer Science v 1174 (1996) pp. 347-350 <http://www.semper.org/sirene/lit/sirene.lit.html> [11] M. D. Swanson, B. Zhu, A. H. Tewfik, “Data hiding for video-in-video,” in ICIP ’97. [12] B. Zhu, M. D. Swanson, and A. H. Tewfik, “Image coding by folding,” in ICIP ’97. [13] I. J. Cox and J. P. M. G. Linnartz, “Some general methods for tampering with watermarks,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 587-593, May 1998 [14] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” Electronic Imaging ’99. Security and Watermarking of Multimedia Contents, vol. 3657, San Jose, CA, USA, 25-27 January 1999. <http://www.cl.cam.ac.uk/~fapp2/papers/ei99-benchmark/> [15] F. Hartung and B. Girod, “Fast public-key watermarking of compressed video,” in ICIP ’97. <http://www-nt.e-technik.uni-erlangen.de/~hartung/publications.html> [16] I. J. Cox and M. L. Miller, “A review of watermarking and the importance of perceptual modeling,” Proc. SPIE Conf. on Human Vision and Electronic Imaging II, vol 3016, 92-99, February 1987 <http://www.neci.nj.nec.com/homepages/ingemar/ingemar.html> [17] S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung, “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 573-586, May 1998 [18] L. Qiao and K. Nahrstedt, “Watermarking schemes and protocols for protecting rightful ownership and customer’s rights,” Journal of visual communication and image representation, vol. 9, no. 3 Sep. 1998, pp. 194-210. <http://cairo.cs.uiuc.edu/papers.html> [19] M. D. Swanson, B. Zhu, and A. H. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 540-550, May 1998 [20] R. Rivest, “The MD5 message digest algorithm,” Internet Rep., RFC 1321, Apr. 1992 [21] National Institute of Standards and Technology, “Secure Hash Standard,” NIST FIPS Pub 180-1, Apr. 1995 [22] I. Pitas, “A method for signature casting on digital images,” in Proc. Int. Conf. on Image Processing 1996 (ICIP ’96), vol. 3, pp.215-218 [23] Christian J. van den Branden Lambrecht and Joyce E. Farrell, “Perceptual quality metric for digitally coded color images,” in Proceeding of EUSIPCO, pp. 1175-1178, Trieste, Italy, Sep. 1996 <http://ltswww.epfl.ch/publications/p96.html> [24] S. Winkler, “A perceptual distortion metric for digital color images,” in Proceedings of the 5th International Conference on Image Processing, Chicago, Illinois, vol. 3, pp. 399-403, October 4-7, 1998. <http://ltswww.epfl.ch/~winkler/publications.html> [25] W. K. Pratt, Digital Image Processing, 2nd edition, John Wiley & Sons, 1991 [26] H. Gleitman, Psychology, Chinese translation, Yuan-Liou, 1995 [27] USC-SIPI Image Database <http://sipi.usc.edu/services/database/Database.html> [28] Digital watermarking evaluation & benchmarking: Photo database, Copyright 1998-1999 by Fabien A. P. Petitcolas, Computer Laboratory, University of Cambridge <http://www.cl.cam.ac.uk/~fapp2/watermarking/benchmark/image_database.html> [29] Digital watermarking: Evaluation and benchmark, Copyright 1998-1999 by Fabien A. P. Petitcolas, Computer Laboratory, University of Cambridge <http://www.cl.cam.ac.uk/~fapp2/watermarking/benchmark/> [30] D. V. Lindley, Introduction to Probability and Statistics, Part I: Probability, pp. 82-85, Cambridge University Press, 1965. [31] B. Girod, “The information theoretical significance of spatial and temporal masking in video signals,” Proc. SPIE Human Vision, Visual Processing, and Digital Display, vol. 1077, 1989, pp. 178-187 [32] R. L. Pickholtz, D. L. Schilling, and L. B. Milstein, “Theory of spread-spectrum communications─A tutorial,” IEEE Trans. Commun., vol. COM-30, no. 5 May 1982, pp. 855-884 [33] F. Hartung and B. Girod, “Digital watermarking of raw and compressed video,” Proceedings SPIE Digital Compression Technologies and Systems for Video Communication, Oct. 1996, pp. 205-213 <http://www-nt.e-technik.uni-erlangen.de/~hartung/publications.html> [34] B. Y. Yeo and B. Liu, “Rapid scene analysis on compressed video,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 5, no.6, Dec. 1995, pp. 533-544 [35] R. B. Wolfgang and E. J. Delp, “A watermarking technique for digital imagery: further studies,” IEEE International Conference on Imaging, Systems, and Technology, Las Vegas, NV, USA, June 30--July 3, 1997, pp 279─287 <http://dynamo.ecn.purdue.edu/~ace/delp-pub.html> [36] Bruce Schneier, Applied Cryptography, 2nd Edition, Wiley & Sons, 1996 [37] J. J. K. O. Ruanaidh and Thierry Pun, “Rotation, scale and translation invariant digital image watermarking,” Signal Processing, vol. 66, issue 3, May 1998, pp. 303-317 <http://www.elsevier.nl/cgi-bin/cas/tree/store/sigpro/cas_free/browse/ browse.cgi?year=1998&volume=66&issue=3> [38] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain,” Signal Processing, vol. 66, issue 3, May 1998, pp. 385-403 <http://www.elsevier.nl/cgi-bin/cas/tree/store/sigpro/cas_free/browse/ browse.cgi?year=1998&volume=66&issue=3> [39] C. H. Chou and C. W. Chen, “A perceptually optimized 3-D subband codec for video communication over wireless channels,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 6, no. 2, pp. 143-156, Apr. 1996 [40] I. J. Cox and J. P. M. G. Linnartz, “Public watermarks and resistance to tampering,” in ICIP ’97 <http://www.neci.nj.nec.com/homepages/ingemar/> [41] J. -P. M. G. Linnartz and M. van Dijk, “Analysis of the sensitivity attack against electronic watermarks in images,” Second International Workshop on Information Hiding, 14-17 April, 1998, Portland, Oregon, USA <http://diva.eecs.berkeley.edu/~linnartz/water.html> [42] J. Lach, W. H. M. —Smith, and M. Potkonjak, “Fingerprinting digital circuits on programmable hardware,” Second International Workshop on Information Hiding, 14-17 April, 1998, Portland, Oregon, USA <http://www.sanders.com/csrc/pubs.htm> [43] J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying,” IEEE Infocom 94, pp 1278 — 1287 [44] R. Ohbuchi, H. Masuda, and M. Aono, “Watermarking three-dimensional polygonal models through geometric and topological modifications,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 551-560, May 1998 [45] J. K. Su, F. Hartung, and B. Girod, “A channel model for a watermark attack,” Proceedings of SPIE, vol. 3657, Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999 <http://www-nt.e-technik.uni-erlangen.de/~hartung/publications.html> [46] F. Hartung, J. K. Su, and B. Girod, “Spread spectrum watermarking: malicious attacks and counterattacks”, Proceedings of SPIE, vol. 3657, Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999 <http://www-nt.e-technik.uni-erlangen.de/~hartung/publications.html> [47] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on copyright marking systems,” Second Workshop on Information Hiding, Portland, Oregon, USA, April 14-17, 1998 <http://www.cl.cam.ac.uk/~fapp2/papers/ih98-attacks/> [48] D. J. Fleet and D. J. Heeger, “Embedding invisible information in color images,” in ICIP ’97 < http://www-ima.enst.fr/~maitre/ext/ICIP97.html> [49] J. L. Barron, D. J. Fleet, and S. S. Beauchemin, “Performance of optical flow techniques,” International Journal of Computer Vision, vol. 12, 1994, pp. 43-77 [50] R. Barnett and D. Pearson, “Attack operators for digitally watermarked images,” IEE Proceedings on Vision, Image and Signal Processing, vol. 145, no. 4, Aug. 1998, pp. 271-279 [51] R. Barnett and D. Pearson, “Frequency mode LR attack operator for digitally watermarked images,” Electronics Letters, vol. 34, no. 19, Sep. 1998, pp. 1837-1839 [52] G. C. Langelaar, R. L. Langendijk, and J. Biemond, “Removing spatial spread spectrum watermarks by non-linear filtering,” Ninth European Signal Processing Conference (EUSIPCO ‘98), 8-11 September 1998, Island of Rhodes, Greece <http://www-ict.its.tudelft.nl/~gerhard/> [53] M. Maes, “Twin peaks: the histogram attack to fixed depth image watermarks,” Second International Workshop on Information Hiding, 14-17 April, Portland, Oregon, USA <http://www.intec.rug.ac.be/Research/Groups/hfhsdesign/viva/publications.htm> [54] T. Kalker, J. P. Linnartz, and M. van Dijk, “Watermark estimation through detector analysis,” in ICIP ’98 <http://clip.informatik.uni-leipzig.de/~toelke/Watermark.html> [55] B. K. P. Horn and B. G. Schunck, “Determining optical flow,” Artificial Intelligence, 17(1-3), pp. 85-203, 1981 [56] D. Boneh and J. Shaw, “Collusion-secure fingerprinting for digital data,” Proceedings of CRYPTO ’95, pp. 452-465 <http://ncstrl.cs.princeton.edu/Dienst/UI/2.0/Describe/ncstrl.princeton%2fTR-468-94> [57] J. —P. Linnartz, T. Kalker, and G. Depovere, “Modeling the false alarm and missed detection rate for electronic watermarks,” Second International Workshop on Information Hiding, 14-17 April, Portland, Oregon, USA <http://diva.EECS.Berkeley.EDU:80/~linnartz/water.html> [58] S. D. Servetto, C. I. Podilchuk, and K. Ramchandran, “Capacity issues in digital watermarking,” in ICIP ‘98 <http://www.ifp.uiuc.edu/~servetto/publications/>
|