|
46 References [1] Tao Chen; Jingchun Wang; Yonglei Zhou, “Combined digital signature and digital watermark scheme for image authentication”, International Conferences on Info-tech and Info-net, vol. 5, pp.78 — 82, Nov. 2001. [2] Chun-Shien Lu; Liao, H.-Y.M., ”Structural digital signature for image authentication: an incidental distortion resistant scheme”, IEEE Transactions on Multimedia, vol. 5, pp.161 — 173, June 2003. [3] Kwang-Fu Li; Tung-Shou Chen; Seng-Cheng Wu, “Image tamper detection and recovery system based on discrete wavelet transformation”, IEEE Pacific Rim Conference on Communications, Computers and signal Processing, vol. 1, pp.164 - 167, Aug. 2001. [4] Shinfeng D Lin, Shin-Chieh Shie, and Chien-Nan Chen, “Image Tamper Detection and Recovery using Data Hiding”, Master thesis, CSIE, National Dong Hwa University, July 2002. [5] Tung-Shou Chen; Chen, J.; Jian-Guo Chen, “Tamper detection and retrieval technique based on JPEG2000 with LL subband”, 2004 IEEE International Conference on Networking, Sensing and Control, vol. 2, pp.1235-1240, March 2004. [6] “Special Issue-Intellectual Rights on the Multimedia” Communications of the CCISA, Jan. 2004. [7] Li Zhi; Sui Ai Fen; Yang Yi Xian; ” A LSB steganography detection algorithm”, 14th IEEE Proceedings on Personal, vol.3, pp.2780 — 2783, Sept.2003. [8] Amin, M.M.; Salleh, M.; Ibrahim, S.; Katmin, M.R.; Shamsuddin, M.Z.I., ” Information hiding using steganography”, 4th National Conference on Telecommunication Technology, pp.21 — 25, Jan. 2003. [9] Po-Chyi Su; Kuo, C.-C.J.; ”Steganography in JPEG2000 compressed images”, Consumer Electronics, IEEE Transactions on , Vol:49, Issue:4, pp:824 — 832, Nov. 47 2003. [10] Ying Wang; Moulin, P.; “Steganalysis of block-DCT image steganography”, Statistical Signal Processing, 2003 IEEE Workshop on, pp:339 — 342, Oct. 2003. [11] 戴顯權, 陳政一, “JPEG-2000”, 紳藍出版社, Nov 2002. [12] Rafael C. Gonzalez Richard E. Woods, “Digital image processing” second edition. [13] Jeong-Ho Park; Gee-Ju Chae; Jong-Hyun Park; Kyung-Ok Kim; “ROI coding method for multispectral images”, 2003 IEEE International Geoscience and Remote Sensing ymposium, vol. 6, pp.3592 — 3594, July 2003. [14] Watanabe, O.; Kiya, H., “An extension of ROI-based scalability for progressive transmission in JPEG2000 coding”, 2002 Asia-Pacific Conference on Circuits and Systems, vol. 1, pp.535 — 540, Oct. 2002. [15] 陳同孝, 張真誠, 黃國峰,“數位影像處理技術”, 松崗電腦圖書, Jun 2001 [16] 戴顯權,”資料壓縮”, 紳藍出版社, July 2001. [17] R.z. Wang, C.F. Lin, J.C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm”, Pattern Recognition 34 (2001) 671-683. [18] Kostopoulos, I.; Gilani, S.A.M.; Skodras, A.N, “Colour image authentication based on a self-embedding technique”, 14th International Conference on Digital Signal Processing, vol.2, pp.733 — 736, July 2002. [19] Hua Zhong; Fang Liu; Li-cheng Jiao, “A new fragile watermarking technique for image authentication”, 6th International Conference on Signal Processing, vol.1, pp.792 - 795, Aug. 2002. [20] Du Jiang; Huang Jingxiong; Xie Weixin, “ Study on tamper-proofing of digital media”, Proceedings of the 3rd World Congress on Intelligent Control and Automation, vol. 4, pp.2695 - 2698, July 2000.
|