|
[1] Ko-Ming Chan, “Public Watermarking System based on Wavelet Transform with Cryptographic and Self-Correcting Watermark”, Department of Computer Science National Tsing Hua University, 2001. [2] 國科會計劃,計劃主持人:賴溪松、邱榮輝、孫宏民教授,「資訊學門-資訊安全研究發展」規劃報告,Dec. 1999. [3] N. Nikolaidis and I. Pitas, “Copyright protection of images using robust digital signatures,” in Proceedings, IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4, May 1996, pp. 2168-2171. [4] S. Craver, N. Memon, B. L and M. M Yeung “Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications,” IEEE Journal on Selected Areas in Communications, Vol. 16 Issue: 4, May 1998, pp. 573 —586. [5] Houng-Jyh Wang and C.-C. Jay Kuo, "Image Protection via Watermarking on Perceptually Significant Wavelet Coefficients." IEEE 1998 Workshop on Multimedia Signal Processing, Redondo Beach, CA., Dec. 7-9, 1998. [6] R. Rivest, A. Shamir, and L. Strawczynski, “A Method for Obtaining Digital Signature and Public-Key Cryptosystem,” Communication of the ACM, vol. 21, no. 2, Feb. 1978. [7] Siang-Gen Sia, Charles G. Boncelet, and Gonzalo R. Arce, “A Multi-resolution Watermark for Digital Image,” in IEEE 1997. [8] S. B. Wicker and V. K. Bhargava (eds.), Reed-Solomon Codes and Their Applications, IEEE Press, 1994. [9] W. Stallings, "Cryptography and network security: principles and practice, 2nd Edition." Prentice Hall, 1999. [10] Bruce Schneier, "Applied Cryptography", Second Edition, John Wiley & Sons, 1996. [11] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, " Secure Spread Spectrum Watermarking for Multimedia", IEEE Transaction on Image Processing, vol. 6, pp. 1673-1687, Dec. 1997. [12] C.-T. Hsu and J.-L. Wu, "Hidden Digital Watermarks in Images, "IEEE Transactions on Image Processing, Vol. 8,No. 1, pp.58-68, Jan. 1999. [13] Kuo-Shing Liu, “Designing A Distributed RSA User System”, College of Management National Chiao Tung University, June 1992. [14] Rafael C. Gonzalez, Richard E. Woods, “Digital Image Processing”, Addison Wesley, 1992. [15] Ping Wath Wong, Nasir Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp 1593-1601, OCTOBER 2001. [16] Chiou-Ting Hsu, Ja-Ling Wu, “Hidden Digital Watermarks in Images”, IEEE Transactions on Image Processing, Vol. 8, No. 1, pp 58-68, January 1999. [17] Nasir Memon, Ping Wah Wong, “A Buyer-Seller Watermarking Protocol”, IEEE Transactions on Image Processing, Vol. 10, No. 4, pp 643-649, April 2001. [18] Hiroo Wakaumi, Takatoshi Komaoka, Eiji Hankui, “Grooved Bar-Code Recognition System with Tape-Automated-Bonding Head Detection Scanner”, IEEE Transactions on Magnetics, Vol. 36, No. 1, pp 366-370, January 2000. [19] 商品條碼應用手冊,中華民國商品條碼策進會/經濟部商業司,1993
|