|
[1]http://www.alpvision.com/watermarking.html [2]Ping Wah Wong, and Nasir Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Processing, Vol. 10, No. 10, Oct. 2001. [3]http://www.bbc.co.uk/rd/pubs/paper_14/paper_14.html [4]CCIR Recommendation 601-1:1990, “Encoding parameters of digital television for studios.” [5]RAO, K.R. and YIP, P.: “Discrete cosine transform: algorithms, advantages, applications” , Academic Press, 1990. [6]S. Mallat, “A theory for multiresolution signal decomposition: The wavelet representation,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 11, pp. 674-693, 1989. [7]I. Daubechies, “Orthonormal bases of compactly supported wavelets,” IEEE Trans. Inform. Theory, Vol. 36, pp. 961-1005, Sept. 1990. [8]A.S. Lewis and G. Knowles, “A VLSI architecture for the 2D Daubechies wavelet transform without multipliers,” Electron. Letter, Vol. 27, No. 2 pp. 171-173, 1991. [9]D. Marr, Vision. New York: Freeman, 1982. [10]R. J. Safranek and J. D. Johnston, “A perceptually tuned sub-band image coder with image dependent quantization and post-quantization data compression,” In Proc. IEEE ASSP’89, Vol. 3, pp. 1945-1948, 1989 [11]David Allen, “A Brief Mathematics Introduction to the RSA Cryptographic Algorithm”, http://opop.nols.com/write/RSA.html. [12]R. Rivest, “The MD5 Message-Digest Algorithm”, Network Working Group Request for Comments: 1321, MIT Laboratory for Computer Science and RSA Data Security, Inc., Apr. 1992. [13]J. Touch, “Report on MD5 Performance”, Network Working Group Request for Comments: 1810, ISI Category: Informational, June 1995. [14]Touch, J., Optimized MD5 software, ftp://ftp.isi.edu/pub/hpcc-papers/touch/md5-opt.tar. [15]J. J. K. O Ruanaidh, W. J. Dowling, and F. M. Boland. “Watermarking digital images for copyright protection,” IEE Proceeding on Vision Signal and Image Processing, Vol.143 No. 4, pp. 250-256, Aug. 1996. [16]I. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for images, audio and video,” In Proceedings of the IEEE Int. Conf. On Image Processing ICIP-96, Lauanne, Switzerland, pp. 243-246, Sept. 16-19 1996. [17]S. Pereira, J. J. K. O. Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun, “Template based recovery of Fourier-based watermarks using Log-polar and Log-log maps,” The International Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking, June 7-11, Florence, Italy, 1999. [18]J. F. Delaigle, C. De Vleeschouwer, and B. Macq, “Digital Watermarking,” In Conference 2659- Optical Security and Counterfeit Deterrence Techniques, San Jose, February 1996. SPIE Electronic Imaging: Science and Technology, pp. 99-110. [19]A. Z. Tirkel, G. A. Rankin, R. G. Vanschyndel, W. J. Ho, N. R. A. Mee, and C. F. Osborne, “Electronic watermark,” In Dicta-93 Macquarie University, Sydney, pp. 666-672, Dec. 1993. [20]F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, Vol. 66, pp. 283-301, 1998. [21]B. Zhu M. D. Swanson and A. H. Tewfik, “Multiresolution scene-based video watermarking using perceptual models,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 540-550, May 1998. [22]G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-time labeling methods for MPEG compressed video,” In Proc. 18th Symp. Information Theory in the Benelux, Veldhoven, The Netherlands, May 1997. [23]I. J. Cox and J. P. M. G. Linnartz, “Some general methods for tampering with watermarks,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 587-593, May 1998. [24]Mauro Barni, Franco Bartolini, and Alessandro Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. Image Processing, Vol. 10, No. 5, pp. 783-791, May 2001. [25]A. S. Lewis and G. Knowles, “Image compression using the 2-D wavelet transform,” IEEE Trans. Image Processing, Vol. 1, No. 2, pp. 244-250, Apr. 1992. [26]Fred Jordan, Martin Kutter, and Touradj Ebrahimi, ISO/IEC JTC1/SC29/WG11/MPEG97/July 1997, m2218. [27]Jie Song and K. J. R. Liu, “A data embedding scheme for H.263 compatible video coding,” IEEE International Symposium on Circuits and Systems (ISCAS'99), Vol. 4, pp. 390-393, Orlando, Florida, June 1999.
|