|
References [1]B. Schneier, Applied Cryptography, 2nd Edition, John Wiley & Sons, 1996. [2]D. E. Stinson, Cryptography: Theory and Practice, CRC Press, 1995. [3]M. Kutter, "Digital Watermarking: Hiding Information in images", Ph.D. thesis 2045, Swiss Federal institute of Technology, Lausanne, Switzerland, 1999. [4]H. Berghel and L. O'Gorman, "Protecting Ownership Rights through Digital Watermarking", IEEE Computer Mag., PP.101-103, July 1996. [5]M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia Data-Embedding and Watermarking Technologies", Proc. IEEE, Vol. 86, PP.1064-1087, June 1998. [6]S. J. Lee and S. H. Jung, "A Survey of Watermarking Techniques Applied to Multimedia", IEEE International Symposium on Industrial Electronics, Vol. 1, 2001. [7]F. Mintzer, G. W. Braudaway and M. M. Yeung, "Effective and Ineffective Digital Watermarks", International Conference on Image Processing, Vol. 3, PP. 9-12, 1997. [8]F. Mintzer, G. W. Braudaway and M. M. Yeung, "Digital Watermarking for High-quality Imaging", IEEE First Workshop on Multimedia Signal Processing, PP. 357-362, 1997. [9]F. C. Mintzer, L. E. Boyle, A. N. Cazes, B. S. Christian, S. C. Cox, F. P. Giordano, H. M. Gladney, J. C. Lee, M. L. Kelmanson, A. C. Lirani, K. A. Magerlein, A. M. B. Pavani, and F. Schiattarella, "Toward on-line, Worldwide Access to Vatican Library Materials", IBM Journal of Research and Development, Vol. 40, 1996. [10]G. W. Braudaway, K. A. Magerlein, and F. C. Mintzer, "Protecting Publicly-Available Images with A Visible Image Watermark", SPIE Conference on Optical Security and Counterfeit Deterrence Techniques, Vol. SPIE 2659, PP. 126-132, Feb. 1996. [11]M. S. Kankanhalli and K. R. Ramakrishnan, "Adaptive Visible Watermarking of Images", IEEE International Conference on Multimedia Computing and Systems, Vol. 1, 1999. [12]S. P. Mohanty, K. R. Ramakrishnan and M. S. Kankanhalli, "A DCT Domain Visible Watermarking Technique for Images", IEEE International Conference on Multimedia and Expo, Vol. 2, PP. 1029-1032, 2000. [13]Y. Hu and S. Kwong, "Wavelet Domain Adaptive Visible Watermarking", ELECTRONICS LETTERS, 27th, Vol. 37, No. 20, Sep. 2001. [14]M. M. Yeung and F. Mintzer, "An Invisible Watermarking Technique for Image Verification", IEEE Conference on Image Processing, Vol. 2, PP. 680-683, 1997. [15]J. Fridrich, "Methods for Detecting Changes in Digital Images", Proc. IEEE Int. Workshop on Intell. Signal Processing and Communication Systems, 1998. [16]D. kundur and D. Hatzinakos, "Digital Watermarking for TellTale Tamper Proofing and Authentication", Proceedings of the IEEE, Vol. 87, PP. 1167 -1180, 1999. [17]C. S. Lu, H. Y. Mark Liao and C. J. Sze, "Combined Watermarking for Image Authentication and Protection", IEEE Int. Conf. on Multimedia and Expo, Vol. 3, PP. 1415 -1418, 2000. [18]C. S. Lu, H. Y. Mark Liao and L. H. Chen, "Multipurpose Audio Watermarking", Proc. 15th Int. Conf. on Pattern Recognition, Vol. 3, PP. 282 -285, 2000. [19]C. T. Hsu and J. L. Wu, "Hidden Digital Watermarks in Images", IEEE Trans. Image Processing, Vol. 8, No. 1, PP. 58-68, 1999. [20]W. N. Lie and L. C. Chang, "Spatial-Domain Image Watermarking By Data Embedding At Adaptive Bit Positions", 12th IPPR Conference on Computer, Vision, Graphics and Image Processing, PP. 16 -21, 1999. [21]S. C. Pei, Y. H. Chen and R. F. Torng, "Digital Image and Video Watermarking Utilizing Just-Noticeable-Distortion Model", 12th IPPR Conference on Computer Vision, Graphics and Image Processing, PP. 174 -182, 1999. [22]M. Piva, F. Barni and V. Cappellini, "DCT Based Watermarking Recovering without Resorting t the Uncorrupted Original Image", Proc. of IEEE Inter. Conf. on Image Processing, Vol. 1, PP. 520-523, 1997. [23]W. C. Cheng, C. W. Chu and J. S. Wang, "A Robust Watermarking Method on Discrete Cosine Transform Domain", 12th IPPR Conference on Computer Vision, Graphics and Image Processing, PP. 191 -198, 1999. [24]S. D. Lin and C. F. Chen, "A Robust DCT-based Watermarking for Copyright Protection", Consumer Electronics, IEEE Trans. Vol. 46, PP. 415 -421, Aug. 2000. [25]J. Onishi and K. Matsui, "A Method of Watermarking with Multiresolution Analysis and PN Sequence", Trans. of IEICE (D-II), Vol. J80-D-II, No.11, PP. 3020, 1997. [26]H. Inoue, A. Miyazaki, A. Yamamoto and T. Katsura, "A digital watermark based on the wavelet transform and its robustness on image compression", ICIP 98, Proceedings, Vol. 2, PP.391 -395, 1998. [27]Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, and Hong-Yuan Mark Liao, "Cocktail Watermarking for Digital Image Protection", IEEE Transactions on Multimedia, Vol. 2, No. 4, PP. 209 -224, Dec. 2000. [28]D. Chai and A. Bouzerdoum, "JPEG2000 Image Compression: An Overview", 7th Australian and New Zealand Intelligent Information Systems Conference, Nov. 2001. [29]C. C. Chang, K. F. Hwang and Y. Lin, "A Proof of Copyright Ownership Using Moment-preserving", The 24th Annual International Computer Software and Applications Conference, PP. 198-203, 2000. [30]M. Alghoniemy and A. H. Tewfik, "Image Watermarking by Moment Invariants", International Conference on Image Processing, Vol. 2, PP. 73-76 2000. [31]M. Alghoniemy and A. H. Tewfik, "Geometric Distortion Correction Through Image Normalization", IEEE International Conference on Multimedia and Expo, Vol. 3, PP. 1291-1234, 1999.
|