|
[1] I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, 1997, “Secure spread spectrum watermarking for multimedia” IEEE Trans. on Image Processing, vol. 6, Issue:12, pp.1673-1687, Dec. [2] M.J. Tsai, K.Y. Yu, and Y.Z. Chen, 2000, “Joint Wavelet and Spatial Transformation for Digital Watermarking” IEEE Trans. on Consumer Electronics, vol. 46, Issue: 1, pp. 237, Feb. [3] A. H. Tewfik and M. Swanson, 1997, “Data hiding for multimedia personalization, interaction, and protection,” IEEE Signal Processing Mag. , pp.41-44, July. [4] C. S. Lu, and H. M. Liao, 2001, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. on Image Processing, vol. 10, no. 10, pp. 1579-1592. [5] Z. M. Lu, H. T. Wu, D. G. Xu and S. H. Sun, 2003, “A multipurpose image watermarking method for copyright notification and protection,” IEICE Trans. Inf. and Syst., vol. E86-D, no. 9, pp. 1931-1933. [6] J. Meng, and S. F. Chang, 1998, “Embedding visible video watermarks in the compressed domain,” Proc. of IEEE Int. Conf. on Image Processing (ICIP’98), pp. 474-477. [7] M. S. Kankanhalli, Rajmohan, and K. R. Ramakrishnan, 1999, “Adaptive visible watermarking of images,” Proc. of IEEE Int. Conf. on Multimedia Computing and Systems, pp. 568-573. [8] P. M. Chen, 2000 , “A visible watermarking mechanism using a statistic approach,” Proc. of IEEE 5th Int. Conf. on Signal Processing (WCCC-ICSP’2000), pp. 910-913. [9] S. P. Mohanty, K. R. Ramakrishnan, and M. S. Kankanhalli, 2000, “A DCT domain visible watermarking technique for images,” Proc. of IEEE Int. Conf. on Multimedia and Expo(ICME’2000), pp. 1029-1032. [10] Y. J. Hu, and S. KWONG, 2001, “Wavelet domain adaptive visible watermarking,” Electron. Lett., vol. 37, no. 20, pp. 1219-1220. [11] Fergusson, R.J. , Soraghan, J.J. , 1999. “HVS based motion estimation on the TMS320C80 multimedia video processor,” Image Processing And Its Applications, Seventh International Conference on (Conf. Publ. No. 465) vol.1, pp. 489 -492, Jul. [12] Delaigle, J.F, Devleeschouwer, C. , Macq, B. , Langendijk, L. , 2002. “Human visual system features enabling watermarking,” Multimedia and Expo, Proceedings. 2002 IEEE International Conference on , vol. 2 , pp.148-152. [13] J. Huang and Y. Q. Shi, 1998, “An adaptive image watermarking scheme based on visual masking,” Electron. Lett. , vol. 34, pp.748-750, Apr. [14] Guoliang Fan and Wai-Kuen Cham, 2001, “Postprocessing of low bit-rate wavelet-based image coding using multiscale edge characterization,” Circuits and Systems for Video Technology, IEEE Transactions on , vol. 11 Issue: 12, pp. 1263 —1272, Dec. [15] J. Huang and Y. Q. Shi, Apr, 1998, “An adaptive image watermarking scheme based on visual masking,” Electron. Lett. , vol. 34, pp.748-750. [16] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, 1999, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66 , no.3, pp. 357-372. [17] J.J. Chase and B.S. Manjunath, 1998, ” A robust embedded data from wavelet coefficients,” Proc. Of the SPIE International Conference on Strage and Retrieval for Image and Video Databases , vol. 3312, pp.308-317. [18] C.H. Lee and Y.K. Lee, 1999, “ An adaptive digital image watermarking technique for copyright protection,” IEEE Trans. on Consumer Electronic, vol. 45, no.4, pp.1005-1013, Nov. [19] F. Glover and M. Laguna, 1997, Tabu search. Boston, MA: Kluwer Academic Publishers. [20] D. T. Pham and D. Karaboga, Intelligent optimisation techniques, 2000, “genetic algorithms, tabu search, simulated annealing, and neural networks”, London. [21] C. S. Lu, H. Y. Mark Liao, S. K. Huang, and C. J. Sze, 1999, “Cocktail Watermarking on Images”, to appear in 3rd International Workshop on Information Hiding, Dresden, Germany, Sept. 29-Oct. 1 . [22] S. G. Mallat, 1989, “A Theory for multiresolution signal decomposition: the wavelet representation,” IEEE Trans. On PAMI, vol. 11, no. 7, pp. 674-693. [23] M. Antonini, M. Barlaud, P. Mathieu and I Daubechies, 1992 , “Image Coding Using Wavelet Transform, ” IEEE Trans. on Image Processing, vol. 1, no. 2, pp. 205-220. [24] C.T. Hsu and J.L. Wu, 1998, ” Multi-resolution watermarking for digital images”, IEEE Trans. Circuits Syst. Part-II , vol. 45, no. 8, pp. 1097-1101, Aug. [25] J.R. Hernandez, M. Amado and F.P. Gonzalez, 2000, ” DCT-domain watermarking techniques for still image :detector performance analysis and a new structure”, IEEE Trans. on Image Processing, vol. 9, No.1, pp.55-68, Jan. [26] C. S. Shieh, H. C. Huang, F. H. Wang, and J. S. Pan, 2004, “Genetic Watermarking Based on Transform Domain Techniques,” Pattern Recognition, vol. 37, no. 3, pp. 555—565. [27] H. C. Huang, J. S. Pan, C. S. Shieh, and F. H. Wang, 2003, “Genetic-based Progressive Image Watermarking Algorithms,” Proceedings of the 37th IEEE International Carnahan Conference on Security Technology, Taipei, Taiwan, R.O.C., pp. 62—65. [28] Zhigang Fan and de Queiroz R. , 2000, “Maximum likelihood estimation of JPEG quantization table in the identification of bitmap compression history,” Image Processing. Proceedings. 2000 International Conference on . vol. 1 , pp. 948 -951. [29] 鍾國亮,民國九十一年,資料壓縮的原理與應用,全華。 [30] 鍾國亮,民國九十一年,影像處理與電腦視覺,初版,東華書局。 [31] 戴顯權,民國九十年,資料壓縮,紳藍。 [32] 陳同孝,張真誠,黃國峰,民國九十年,數位影像處理技術,松崗。 [33] B.M. Macq, J.J.Quisquater, 1995, “Cryptography for Digital TV Broadcasting”, Proc. of the IEEE, vol. 83, No.6, pp.944-957, June.
|