參考文獻
[1]Abdulaziz, N. K., and Pang, K. K., “Robust Data Hiding For Images,” Communication Technology Proceedings, WCC - ICCT 2000, International Conference, Beijing, Vol. 1, pp. 380-383, 21-25 Aug., 2000.
[2]Barreto, P., Kim, H. Y., and Rijmen, V., “Toward a Secure Public-key Blockwise Fragile Authentication Watermarking,” Proceeding of International Conference on Image Processing, Thessaloniki, Vol. 2, pp. 494-497, 7-10 Oct., 2001.
[3]Garg, G., Sharma, P. K., and Chaudhury, S., “Image Based Authentication Using DCT,” Pattern Recognition Letters, Vol. 22, No. 6, pp. 725-729, July, 2000.
[4]Hartung, F., and Kutter, M., “Multimedia Watermarking Techniques,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1079-1107, July, 1999.
[5]Barni, M., Bartolini, F., and Piva, A., “Improved Wavelet-Based Watermarking Through Pixel-Wise Masking,” IEEE Transactions on Image Processing, Vol. 10, No. 5, pp. 783-791, May, 2001.
[6]Hsu, C. T., and Wu, J. L., “Hidden Signature in Images,” Proceeding of International Conference on Image Processing, Lausanne, Vol. 03, pp. 223-226, 16-19 Sep., 1996.
[7]Liu, Tong, and Qiu, Zheng-Ding, “The Survey of Digital Watermarking-Based Image Authentication Techniques,” International Conference on Signal Processing, Aegean Island, Santorini, Hellas(Greece), Vol. 2, pp. 1556-1559, 26-30 Aug., 2002.
[8]Lee, J., and Won, C. S., “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 2, pp. 313-317, May, 2000.
[9]Lin, C. Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., and Lu, Y. M., “Rotation, Scale and Translation Resilient Watermarking for Images,” IEEE Transactions on Image Processing, Vol. 10, No. 5, May, 2001.
[10]Schneider, M., and Chang, S. F., “A Robust Content Based Digital Signature for Image Authentication,” Proceeding of International Conference on Image Processings, Lausanne, Vol. 03, pp. 227-230, 16-19 Sep., 1996.
[11]Skodras, A., Christopoulos, C., and Ebrahimi, T., “The JPEG-2000 Still Image Compression Standard,” IEEE Signal Processing Magazine, Vol. 18, No. 5, pp. 36-58, Sep., 2001.
[12]Shih, F. Y., and Wu, S. S. T., “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition Letters, Vol. 36, No. 4, pp. 969-975, April, 2003.
[13]Sun, Q., Chang, S. F., Kurato, M., and Suto, M., “A Quantitative Semi-Fragile JPEG2000 Image Authentication System,” Proceeding of International Conference on Image Processing, Novosibirsk, Vol. 2, pp. II-921-II-924, 22-25 Sep., 2002.
[14]Tseng, Y. C., Chen, Y. Y., and Pan, H. K., “A Source Data Hiding Scheme for Binary Images,” IEEE Transactions on Communication, Vol. 50, No. 8, pp. 223-225, Aug., 2002.
[15]Wu, M., and Liu, B., “Watermarking for Image Authentication,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, Vol. 2, pp. 437-441, 4-7 Oct., 1998.
[16]Wong, P. W., “A Public Key Watermark for Image Verification and Authentication,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, Vol. 1, pp. 455-459, 4-7 Oct., 1998.
[17]Wong, P. W., and Memom, N., “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,” IEEE Transaction on Image Processing, Vol. 10, No. 10, Oct., 2001.
[18]Wu, C. W., “On the Design of Dontent-Based Multimedia Authentication System,” IEEE Transaction on Multimedia, Vol. 4, No. 3, Sep., 2002.
[19]Yu, G. J., Lu, C. S., Liao, H. Y. M., and Sheu, J. P., “Mean Quantization Blind Watermarking for Image Authentication,” Proceedings of IEEE 2000 International Conference on Image Processing, Vancouver, BC, Vol. 2, pp. 706-709, 10-13 Sep., 2000.
[20]Zou, D., Wu, C. W., Xuan, G., and Shi, Y. Q., “A Content-Based Authentication System with Lossless Data Hiding,” IEEE International Conference on Multimedia and Expo, Baltimore, Maryland, Vol. 2, pp. 6-9, 6-9 July, 2003.
[21]陳同孝、張真誠、黃國峰,數位影像處理技術,松崗電腦圖書資料股份有限公司,2001。
[22]Ledley, R. S., Buas, M., and Golab, T. J., “Fundamentals of True-Color Image Processing,” Proceedings of International Conference on Pattern Recognition, Atlantic City, NJ , Vol. 1, pp. 791-795, 16-21 June, 1990.
[23]吳成柯、程湘君、戴善榮、雲立實,數位影像處理,儒林圖書有限公司,1996。
[24]Inoue, H., Miyazaki, A., Yamsmoto, A., and Katsura, T., “A Digital Watermark Technique Based on the Wavelet Transform and its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E82-A, pp. 391-395, Jan., 1999.
[25]Hsu, C. T., and Wu, J. L., “Multiresolution Watermarking for Digital Images,” IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp. 1097-1101, Aug., 1998.
[26]Hsu, C. T., and Wu, J. L., “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processing, Vol.8, No. 1, pp. 58-68, Jan., 1999.
[27]Shih, F. Y., and Wu, Y. T., “Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition, Vol. 36, No. 4, pp. 969-975, April, 2003.
[28]Wu, Ja-Ling, “A Shift-Resisting Blind Watermark System of Panoramic Image,” Consumer Electronics on IEEE Transaction, Los Angles, CA, pp. 8-9, 13-15 June, 2000.
[29]Lu, P. C., Hsieh, C. H., and Tsai, J. C., “An Adaptive Algorithm for Cosine Transformed Images,” in the Proceedings of IEEE International Conference on Image Processing, Warwick, pp. 261-265, 18-20 Jul., 1989.
[30]Trista, Pei-chun, and Tsuhan, Chen, “A Framework for Optimal Blind Watermark Detection,” Technical Report AMP 01-03, Carnegie Mellon University, Pittsburgh, pp. 1-32, September, 2001.
[31]Barni, M., Bartolini, F., and Piva, A., “Multichannel Watermarking of Color Images,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, No. 3, Mary, 2002.
[32]Gilani, S. A. M., Kotopoulos, I., and Skodras, A. N., “Color Image-Adaptive Watermarking,” International Conference on Digital Signal Processing, Santorini, Hellas(Greece), Vol. 2, pp. 721-724, 1-3 July, 2002.
[33]Haykin, S., Adaptive Filter Theory, Prentice Hall, 2002.
[34]Petitcolas, F. A. P., Anderson, R. J., and Kuhn, M. G., “Attacks on Copyright Marking Systems,” Second International Workshop in the Proceedings of Information Hiding, Portland, Oregon, U.S.A., Springer-Verlag, pp. 219-239, 15-17 April, 1998.
[35]Petitcolas, F. A. P., “Watermarking Schemes Evaluation,” IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 58-64, Sept., 2000.
[36]Adams, M. D., and Kossentini, F., “JasPer: A Software-Based JPEG-2000 Codec Implementation,” International Conference on Image Processing, Vancouver, BC, Canada, Vol. 2, pp. 53-56, 10-13 Sept., 2000.
[37]Pratt, W. K., Digital Image Processing, Addison Wessley Publishing Company, 1991.
[38]Gonzalez, R. C., and Woods, R. E., Digital Image Processing, Prentice Hall, pp. 299-300, 2002.
[39]Kundur, D., and Hatzinakos, D., “Toward Robust Logo Watermarking Using Multiresolution Image Fusion Principles,” IEEE Transactions on Multimedia, Vol. 6, No. 1, pp. 185-198, Feb., 2004.
[40]Podilchuk, C. I., and Zeng, W., “Image-Adaptive Watermarking Using Visual Models,” IEEE Journal on Selected Areas in Communication, Vol. 16, No. 4, pp. 525-539, May, 1998.
[41]羅銘耀,“植基於小波轉換之彩色影像浮水印技術”,碩士論文,國立東華大學資訊工程研究所,花蓮,2004。