|
[1] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, No. 6, Jun. 2002, pp. 585-595. [2] D. H. Bailey., “Extra-High Speed Matrix Multiplication on the Cray-2,” SIAM Journal on Scientific and Statistical Computing, vol. 9, no. 3, May 1988, pp. 603-607. [3] C. C. Chang, F. C. Shine, and T. S. Chen, “A New Scheme of Progressive Image Transmission Base on Bit-Plane Method,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, Beijing, China, 1999, pp. 892-895. [4] T. S. Chen and C. C. Chang, “Progressive Image Transmission Using Side Match Method,” Information Systems and Technologies for Network Society, World Scientific Publishing Co. Pte. Ltd., Singapore, 1997, pp. 191-198. [5] K. L. Chung, C. H. Shen, and L. C. Chang, “A novel SVD- and VQ-based image hiding scheme,” Pattern Recognition Letters, Vol. 22, No. 9, Jul. 2001, pp. 1051-1058 [6] G. H. Golub and C. F. Van Loan., “Matrix Computations,” The Johns Hopkins University Press., Baltimore, MD (Chapter 8), 1989. [7] R. M. Gray, “Vector Quantization,” IEEE ASSP Magazine, 1984, pp. 4-29. [8] S. F. Hsiao, J. M. Delosme, “Parallel singular value decomposition of complex matrices using multidimensional CORDIC algorithms,” IEEE Transactions on Signal Processing, Vol. 44, No. 3 , Mar. 1996, pp. 685 -697. [9] M. S. Hsieh, D. C. Tseng, and Y. H. Huang, “Hiding Digital Watermarks Using Multiresolution Wavelet Transform,” IEEE Transactions on Industrial Electronics, Vol. 48, No. 5, Oct. 2001, pp. 875-882. [10] K. L. Hung, C. C. Chang, and T. S. Chen, “A Side-Match Reconstruction Method Using Tree Structure VQ for Transmitting Image Progressively,” to appear in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, 2003. [11] J. H. Jiang, C. C. Chang, and T. S. Chen, “Selective Progressive Image Transmission Using Diagonal Sampling Technique,” Proceedings of International Symposium on Digital Media Information Base, Nara, Japan, 1997, pp. 59-67. [12] K. Konstantinides, B. Natarajan, and G. S. Yovanof, “Noise Estimation and Filtering Using Blocked-Based Singular Value Decomposition,” IEEE Transactions on Image Processing, Vol. 10, No. 3, 1997, pp. 479-483. [13] R. C. Lee, T. H. Chin, and S. C. Chang, “Application of Principal Component Analysis to Multikey Searching,” IEEE Transactions on Software Engineering, Vol. SE-2, No. 3, Sep. 1976, pp. 185-193. [14] C. Y. Lin and S. F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation, ” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11 , No. 2 , Feb. 2001 pp.153 - 168 [15] Y. Linde, A. Buzo, and R. M. Gray, “An Algorithm for Vector Quantization Design,” IEEE Transactions on Communications, Vol. 28, Jan. 1980, pp. 84-95. [16] C. S. Lu, and H. Y. M. Liao, “Structural Digital Signature for Image Authentication: An Incidental Distortion Resistant Scheme,” IEEE Transactions on Multimedia, Vol. 5, No. 2, 2003, pp. 161-173. [17] P. Tsai, Y. C. Hu, and C. C. Chang, “Using Set Partitioning in Hierarchical Tree to Authenticate Digital Images,” Signal Processing: Image Communication, Vol. 18, No. 9, Oct. 2003, pp. 813-822. [18] C. H. Tzeng and W. H. Tsai, “A New Approach to Authentication of Binary Images for Multimedia Communication With Distortion Reduction and Security Enhancement,” IEEE Communications Letters, Vol. 7, No. 9, Sep. 2003, pp. 443-445. [19] P. W. Wong, “A Public Key Watermark for Image Verification and Authentication,” Proceedings of IEEE International Conference on Image Processing, Vol. 1, Chicago, IL, Oct. 1998, pp. 425-429. [20] P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE Transactions on Image Processing, Vol. 10, No. 10, Oct. 2001, pp. 1593-1601. [21] C. W. Wu, “On the Design of Content-Based Multimedia Authentication Systems,” IEEE Transactions on Multimedia, Vol. 4, No. 3, Sep. 2002, pp. 385-393. [22] J. F. Yang and C. L. Lu, “Combined Techniques of Singular Value Decomposition and Vector Quantization for Image Coding,” IEEE Transactions on Image Processing, Vol. 4, No. 8, 1995, pp. 1141-1146.
|