|
[1]Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. “Information Hiding─A survey”, Proceedings of the IEEE , Volume: 87 Issue: 7 , July 1999 Page(s): 1062 -1078[2]Decker, S. “Engineering Considerations in Commercial Watermarking”, IEEE Communications Magazine , Volume: 39 Issue: 8 , Aug. 2001 Page(s): 128 -133[3]Van Schyndel, R.G.; Tirkel, A.Z.; Osborne, C.F. “A digital watermark”, Image Processing, 1994. Proceedings. ICIP-94., IEEE International Conference, Volume:2 , 1994 Page(s): 86 -90 vol.2[4]Cox, I.J.; Kilian, J.; Leighton, T.; Shamoon, T. “Secure spread spectrum watermarking for images, audio and video”, Image Processing, 1996. Proceedings., International Conference on , Volume: 3 , 1996 Page(s): 243 -246 vol.3[5]Cox, I.J.; Kilian, J.; Leighton, F.T.; Shamoon, T. “Secure spread spectrum watermarking for multimedia”, Image Processing, IEEE Transactions on , Volume: 6 Issue: 12 , Dec. 1997 Page(s): 1673 -1687[6]De Vleeschouwer, C.; Delaigle, J.-F.; Macq, B. “Invisibility and Application Functionalities in Perceptual Watermarking─An Overview”, Proceedings of the IEEE , Volume: 90 Issue: 1 , Jan. 2002 Page(s): 64 -77[7]Hernandez, J.R.; Amado, M.; Perez-Gonzalez, F. “DCT-domain watermarking techniques for still images: detector performance analysis and a new structure”, Image Processing, IEEE Transactions on , Volume: 9 Issue: 1 , Jan. 2000 Page(s): 55 -68[8]Langelaar, G.C.; Lagendijk, R.L. “Optimal differential energy watermarking of DCT encoded images and video”, Image Processing, IEEE Transactions on , Volume: 10 Issue: 1 , Jan. 2001 Page(s): 148 -158[9]Shapiro, J.M. “Embedded Image Coding Using Zerotrees of Wavelet Coefficients”, Signal Processing, IEEE Transactions on , Volume: 41 Issue: 12 , Dec. 1993 Page(s): 3445 -3462[10]Alturki, F.; Mersereau, R. “Secure blind image steganographic technique using discrete Fourier transformation”, Image Processing, 2001. Proceedings. 2001 International Conference on , Volume: 2 , 2001 Page(s): 542 -545 vol.2[11]H. Liu, H. Ma, M. El Zarki, and S. Gupta, “Error control schemes for networks: An overview,” ACM Mobile Networking and applications (MONET), vol. 2, no. 2, pp. 167-182, 1997.[12]Andrew S. Tanenbaum, “Computer Networks”, Prentice Hall 1996.[13]Sklar, B., “Digital Communications: Fundamentals and Applications” Second Edition (Upper Saddle River, NJ: Prentice-Hall, 2001).[14]Langelaar, G.C.; Setyawan, I.; Lagendijk, R.L. “Watermarking digital image and video data. A state-of-the-art overview” IEEE Signal Processing Magazine , Volume: 17 Issue: 5 , Sept. 2000 Page(s): 20 -46
|