|
[1] C. De Vleeschouwer, J. F. Delaigle, and B. Macq, “Invisibility and application functionalities in perceptual watermarking an overview,” Proceedings of the IEEE, Volume: 90 Issue: 1, Jan. 2002. [2] J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based digital signature for motion pictures authentication and content-fragile watermarking,” Multimedia Computing and Systems, 1999, IEEE International Conference on, Volume: 2, 7-11 June 1999. [3] Chai Wah Wu, “On the design of content-based multimedia authentication systems,” Multimedia, IEEE Transactions on, Volume: 4 Issue: 3, Sept. 2002. [4] Chun-Shien Lu; and H. Y. M Liao, “Multipurpose watermarking for image authentication and protection,” Image Processing, IEEE Transactions on, Volume: 10 Issue: 10, Oct. 2001. [5] Ping Wah Wong and N. Memon, “Secret and public key image-watermarking schemes for image authentication and ownership verification,” Image Processing, IEEE Transactions on, Volume: 10 Issue: 10, Oct. 2001. [6] Hongtao Lu, Ruiming Shen and Fu-Lai Chung, “Fragile watermarking scheme for image authentication,” Electronics Letters, Volume: 39 Issue: 12, 12 Jun 2003. [7] Chun-Shien Lu and H. Y. M. Liao, “Structural digital signature for image authentication: an incidental distortion resistant scheme,” Multimedia, IEEE Transactions on, Volume: 5 Issue: 2, June 2003. [8] Junquan Hu, Jiwu Huang, Daren Huang, and Yun Q. Shi, “Image fragile watermarking based on fusion of multi-resolution tamper detection,” Electronics Letters, Volume: 38 Issue: 24, 21 Nov. 2002. [9] P.S.L.M Barreto, H. Y. Kim, and V. Rijmen, “Toward secure public-key blockwise fragile authentication watermarking,” Vision, Image and Signal Processing, IEE Proceedings, Volume: 149 Issue: 2, April 2002. [10] M. M. Yeung and F. Mintzer, “An invisible watermarking technique for image verification,” Image Processing, 1997. Proceedings., International Conference on , 26-29 Oct. 1997. [11] M. Holliman and N. Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes,” Image Processing, IEEE Transactions on, Volume: 9 Issue: 3, March 2000. [12] F. Bartolini, A. Tefas, M. Barni, and I. Pitas, “Image authentication techniques for surveillance applications,” Proceedings of the IEEE, Volume: 89 Issue: 10, Oct. 2001. [13] D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” Proceedings of the IEEE, Volume: 87 Issue: 7, July 1999. [14] M. Utku Celik, G.. Sharma, E. Saber, and A. Murat Tekalp, “Hierarchical watermarking for secure image authentication with localization,” Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June 2002. [15] Liehua Me and G. R. Arce, “A class of authentication digital watermarks for secure multimedia communication,” Image Processing, IEEE Transactions on, Volume: 10 Issue: 11, Nov. 2001. [16] Ching-Yung Lin and Shih-Fu Chang, “A robust image authentication method distinguishing JPEG compression from malicious manipulation,” Circuits and Systems for Video Technology, IEEE Transactions on, Volume: 11 Issue: 2, Feb 2001. [17] M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “A new decoder for the optimum recovery of nonadditive watermarks,” Image Processing, IEEE Transactions on, Volume: 10 Issue: 5, May 2001. [18] R. Chandramouli, R. and N. D. Memon, “On sequential watermark detection,” Signal Processing, IEEE Transactions on Volume: 51 Issue: 4, April 2003. [19] C. C. Chang, K. F. Hwang, and M. S. Hwang, ”Robust authentication scheme for protecting copyrights of images and graphics,” Vision, Image and Signal Processing, IEE Proceedings-, Volume: 149 Issue: 1, Feb. 2002. [20] T. Kasami, Shu Lin, and W. Peterson,”Polynomial codes,” Information Theory, IEEE Transactions on, Volume: 14 Issue: 6, Nov 1968. [21] Andrew S. Tanebaum, “Computer Networks, Fourth Edition,” The Netherlands Pearson Education International, 2003. [22] S. Walton, Dr. Dobbs, “Information Authentication for a Slippery New Age,”Journal, vol. 20, no. 4, Apr 1995. [23] C. Honsinger, “Data embedding using phase dispersion,” Secure Images and Image Authentication, IEE Seminar on, 10 April 2000. [24] G. Voyatzis and I. Pitas, “Applications of toral automorphisms in image watermarking,” Image Processing, 1996, Proceedings., International Conference on, Volume: 1 , 16-19 Sept. 1996. [25] J. Fridrich, M. Goljan, and N. Memon, ''Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme,'''' Proc. SPIE: Security and Watermarking of Multimedia Contents, 2000. [26] J. Fridrich, ''Security of Fragile Authentication Watermarks with Localization,'''' Proc. SPIE: Security and Watermarking of Multimedia Contents, Vol. 4675, pp. 691-700, 2002. [27] C.Y.Lin and S.F.Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation”, IEEE Transactions on Circuits and Systems of Video Technology, VOL. 11, NO. 2, February 2001. [28] R. Radhakrisnan and N. Memon, “On the Security of the SARI Image Authentication System,” Proc. IEEE Int. Conf. on Image Proc., Vol. III, pp. 971-974, 2001. [29] U.S.DEPARTMENT OF COMMERCE/National Institute of Standards and Technology. FIPS PUB 46-3:Data Encryption Standard (DES), October 25,1999. [30] Diffie, W., and Hellman, M. “New Directions in Cryptography.” IEEE Transactions on Information Theory, November 1976.
|