|
1.Cox, I., Kilian, J., Leighton, T., and Shamoon, T., ”Secure spread spectrum watermarking for multimedia”, IEEE Transactions On Image Processing, Vol. 6, No. 12, pp. 1673- 1687, December 1997 2.Craver, S., Memon N., Yeo B.L., and Yeung M., "Can invisible watermarks resolve rightful ownership?" in Proc. SPIE Stroage and Retrieval for Still Image and Video Databases V, Vol. SPIE 3022, pp. 310-321, 1997. 3.Craver, S. et al. "Technical Trials and Legal Tribulations." Communications of the ACM, Vol. 41, No. 7. p. 45-54, July 1998. 4.Hsu, Chiou-Ting and Wu ,Ja-Ling, "Hidden Signatures in Images," in Proc. of ICIP'96, Vol. III, pp. 743-746, September 1996. 5.Hwang, M.S., Chang, C.C., and Hwang, K.F., “A watermarking technique based on one-way hash functions”, IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 286-294, 1999. 6.Kundur, D., "Energy Allocation for High-Capacity Watermarking In the Presence of Compression ", Proc. IEEE Int. Conf. on Image Processing , Vancouver, Canada, Vol. I, pp. 423-426, 2000. 7.Kutter, M. and Petiticolas F.A.P., ”A fair benchmark for image watermarking systems.”Technical report, University of Cambridge, 1999. 8.Kwon O. H., Kim Y. S. Kim, and Park R. H. Park, ”A DCT-domain watermarking method using the human visual system”, in Proc. Int. Workshop HDTV, pp. 252-260, Seoul, Korea, Oct. 1998. 9.Laangelaar, G. C., J. C. A. van der Lubbe and Biemond, J., “Copy Protection for Multimedia Data Based on Labeling Techniques,” 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996. 10.Lee, Y. K. and Chen, L. H., “An adaptive image steganographic model based on minimum-error LSB replacement,” in Proceedings of the Ninth National Conference on Information Security, pp. 8-15, Taiwan, 1999. 11.Lie, Wen-Nung, Chang, Li-Chun, ”Data Hiding In Images With Adaptive Numbers Of Least Significant Bits Based on the Human Visual System”, Proc. ICIP’99, 1999. 12.Lu, Chun-Shien, Huang, Shih-Kun, Sze, Chwen-Jye, and Liao, Hong-Yuan Mark “Cocktail Watermarking for Digital Image Protection”, IEEE Trans. on Multimedia, Vol. 2, No. 4, pp. 209-224, 2000. 13.Matsui, K. and Tanaka, K., “Video-Steganography: How to Embed a Signature in a Picture”, in Proceedings of IMA Intellectual Property, Vol. 1, No. 1, pp. 187-206, January 1994. 14.Mitchell D. Swanson, Mei Kobayashi, Ahmed H. Tewfik, ”Multimedia Data-Embedding and Watermarking Technologies”, Proceedings of the IEEE, Vol. 86, No. 6, June 1998. 15.Patis, I., “A Method for Signature Casting on Digital Image”, Proc.1996 IEEE Int. Conf. on Image processing, Vol. III, pp.215-218, 1996. 16.Petitcolas, F.A.P., Anderson, R.J., and Kuhn, M.G., "Information hiding - a survey", Proceedings of The IEEE, Vol. 87, pp. 1062-1078, July 1999. 17.Robert Kempf, “Deadlock Attacks on Digital Watermarks”, Telecommunications Seminar, February 3, 1999. 18.Swanson, M., Kobayashi, M., and Tewfik, A., “Multimedia data embedding and watermarking technologies”, Proceedings of the IEEE, Vol. 86, No. 6, pp. 1064-1087, June 1998 19.Tsai, M.J., Yu, K.Y. and Chen, Y.Z., “Joint Wavelet and Spatial Transformation for Digital Watermarking”, IEEE Trans. on Consumer Electronics, Vol. 46, pp. 241-245, Feb. 2000. 20.Voyatzis, G. and Pitas, I., "Embedding robust watermarks by chaotic mixing", in Proceedings of 13th International Conference on Digital Signal Processing (DSP'97), Vol. 1, pp. 213-216, 1997. 21.Voyatzis, G. and Pitas, I., "Protecting digital-image copyrights: A framework", IEEE Computer Graphics and Applications, Vol.19, No.1, pp.18-24, 1999. 22.Zhao, E. J., “Towards Robust and Hidden Image Copyright Labeling”, Proceedings of 1995 IEEE Workshop on Nolinear Signal and Image Processing. 23.徐紹文,“條碼製作入門與實例應用”, 靖宇出版社, 第五版,1992.
|