|
[1] Barni, M., Bartolimi, F., Cappellini, V., and Piva, A., “A DCT-domain system for robust image watermarking,” Signal Processing, Vol. 66, No. 3, pp. 357-372, May, 1998.[2] Bourbakis, N., “A language for efficient accessing of a 2D array,” IEEE Workshop on LFA, Singapore, pp. 52-58, 1986.[3] Bourbakis, N. and Alexopoulos, C., “Picture data encryption using SCAN patterns,”Pattern Recognition, Vol. 25, No. 6, pp. 567-581, 1992.[4] Chang, Henry K. C. and Liu, J. L., “A linear quadtree compression scheme for image encryption,” Signal Processing of Image Communication, Vol. 10, pp. 279-290, Sep. 1997.[5] Chang, K. C. and Liu, J. L., “An image encryption scheme based on quadtreecompression scheme,” Proceedings of Internat. Comput. Symp., Taiwan, pp. 230-237, 1994.[6] Chang, C. C., Hwang, M. S., and Chen, T. S., “A new encryption algorithm for image cryptosystems,” The Journal of Systems and Software, Vol. 58, pp. 83—91, 2001.[7] Chen, T. S., Chang, C. C., and Hwang, M. S., “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, pp. 1485—1488, Oct. 1998.[8] Chung, K. L. and Chang, L. C., “Large encrypting binary images with highersecurity,” Pattern Recognition Letters, Vol. 19, No. 5-6, pp. 461-468, April 1998.[9] Clarke, R. J., “Digital compression of still images and video,” Academic Press, 1995.[10] Cox, I. J., Killian, J, Leighton, F. T., and Shamoon, T., “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1678, Dec. 1997.[11] ElGamal, T., “A public-key cryptosystem and a signature scheme based on discrete logarithms,” Advances in Cryptology: Proceedings of CRYPTO 84, pp. 10-18, Springer-Verlag, 1985.[12] ElGamal, T., “A public-key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transaction on Information Theory, Vol. IT-31. No. 4, pp. 469-472, 1985.[13] Friedman, G. L., “The trustworthy digital camera: restoring credibility to the photographic image,” IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905-910, Nov. 1993.[14] Gonzalez, R. C. and Woods, R. E., “Digital image processing,” Addison Wesley, 1992.[15] Hsieh, M. S., Tseng, D. C., and Huang, Y. H., “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,” IEEE Transactions on Industrial Electrons, Vol. 48, pp. 875-882, Oct. 2001.[16] Hsu, C. T. and Wu, J. L., “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, Vol. 8, No. 1, pp. 56-68, Jan. 1999.[17] Hsu, C. T. and Wu, J. L., “Multiresolution watermarking for digital images,” IEEE Transactions on Circuit and System-II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp. 1097-1101, Aug. 1998.[18] Hwang, M. S., Chang, C. C. and Hwang, K. F., “A watermarking technique based on one-way hash functions,” IEEE Transactions on Consumer Electronic, Vol. 45, no 2, pp. 286-294, May 1999.[19] Kou, W., “Digital image compression algorithms and standards,” Kluwer Academic Publishers, Second Printing, 1995.[20] Lee, Y. K. and Chen, L.H., “High capacity image steganographic model,” IEE Proceedings of Vision, Image and Signal Processing, Vol. 147, pp. 288—294, June 2000.[21] Lou, D. C. and Liu, J. L. “Fault resilient and compression tolerant digital signature for image authentication,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 31-39, Feb. 2000.[22] Podilchuk, C. I. and Zeng, W., “Image-adaptive watermarking using visual models,”IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 525-539,May. 1998.[23] Rivest, R. L., Shamir, A., and Adleman, L. M., “A method for obtaining digital signature and public-key cryptosystems,” Communication of the ACM, Vol. 21, No. 5, pp. 120 - 126, Feb. 1978.[24] Schneier, B., “Applied cryptography,” John Wiley & Sons, 2nd ed, 1996.[25] Tsai, M. J., Yu, K. Y., and Chen, Y. Z., “Joint wavelet and spatial transformation for digital watermarking,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 241-245, Feb. 2000.[26] Wong, P. W. and Memon, N., “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, Vol. 10, pp. 1593—1601, Oct. 2001.[27] Wu M., Tang, E., and Li, B., “ Data Hiding in Digital Binary Image,” IEEE International Conference on ICME, Vol. 1, pp. 393—396, 2000.[28] Wu D. C. and Tsai W. H., “Spatial-domain image hiding using image differencing,”IEE Proceedings on Vision Image and Signal Processing, Vol. 147, No. 1, pp. 29—37, Feb. 2000.
|