|
[1]Hartung, F.; Kutter, M. “Multimedia watermarking techniques”, Proceedings of the IEEE, Volume: 87 Issue: 7, July 1999, Page(s): 1079 -1107 [2]I.J.Cox, J.Kilian, F.T.Leighton, and T.Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Trans. Image Processing, vol. 6, pp.1673—1687, 1997. [3]Podilchuk, C.I., Wenjun Zeng, “Image-adaptive watermarking using visual models”, Selected Areas in Communications, IEEE Journal on, Volume: 16 Issue: 4, May 1998 Page(s): 525—539. [4]R.L.Pickholtz, D.L.Schilling, and L.B.Millstein, “Theory of spread spectrum communications─A tutorial”, IEEE Trans. Commun., vol. COMM-30, pp.855—884, 1982. [5]Y.S.Kim, O.H.Kwon, R.H. Park, “Wavelet based watermarking method for digital images using the human visual system,” Circuits and Systems, ISCAS ''99. Proceedings of the 1999 IEEE International Symposium on Volume: 4, Page(s): 80 -83 vol.4, 1999. [6]J.I.Shin and S.H.Park, “MTF and spatial anisotropy based image compression”, IEICE Trans. Fundamentals, Vol.E83-A, No.9, Sep. 2000, Page(s): 1862-1865. [7]Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze and Hong-Yuan Mark Liao, “Cocktail watermarking for digital image protection”, Multimedia, IEEE Transactions on, Volume: 2 Issue: 4, Dec. 2000, Page(s): 209 —224. [8]Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn., “Attacks on copyright marking systems”, in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH''98, Portland, Oregon, USA, April 15--17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239. [9]Petitcolas, F.A.P.; Anderson, R.J., “Evaluation of copyright marking systems”, Multimedia Computing and Systems, 1999. IEEE International Conference on, Volume: 1, 1999, Page(s): 574 -579 vol.1 [10]A.B.Watson, G.Y.Yang, J.A.Solomon and J.Villasenor, “Visibility of wavelet Quantization noise”, IEEE Trans. Image Processing, vol.6, pp.1164—1175,1997. [11]A. Hocquenghem, “Codes corecteurs d’erreurs”, Chiffres, 2, pp. 147-156, 1959. [12]S.Lin, D.J.Costello, Jr., 1983, “Error control coding”, Prentice Hall, pp 142-180.
|