|
[1] S. Katzenbeisser , F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House Publishers, Boston, London, 2000. [2] I.J. Cox, M.L. Miller, J.A. Bloom, Digital Watermarking, Morgran Kaufmann Publishers, San Francisco, 2002. [3] R.J. Anderson, F.A.P. Petitcalas, “On the limt of steganography”, IEEE Journal Selected Areas Communication. Vol.16, pp. 474-481, 1998. [4] J. Fridrich, “Applications of Data Hiding in Digital Images”, Tutorial for The ISSPA’99, Brisbane, Australia, August,1999. [5] M. T. SandfordⅡ, J. N. Bradley, and T. G. Handel,” The Data Embedding Method”, SPIE Photonics East Conference ,1995. [6] Y.K. Lee and L.H. Chen,”High Capacity Image Steganographic Model”, IEE Proceedings Vision, Image and Signal Processing, Vol. 147, Issue 3, pp. 288-294, 2000. [7] D.C. Wu and W.H. Tsai,” A Steganographic Method for Images by Pixel-Value Differencing”, Pattern Recognition Letters, Vol.24, 1613-1626, 2003. [8] D.C. Wu and W.H. Tsai, “Spatial-domain image hiding using image differencing,” IEE Proceedings-Vision, Image and Signal Processing, vol. 147, no. 1, pp. 29-37, 2000 [9] N.F. Maxemchuk, “Electronic Document Distribution”, AT & T Technical Journal, Vol. 73, pp. 73-80, 1994. [10] W. Bender, D.Gruhl, N.Morimoto, and A. Lu, “Techniques for Data Hiding”, IBM System Journal, Vol. 35, Nos 3&4, pp.313-336, 1996. [11] P. Bas, J-M. Chassery, and F. Davoine,”Using the Fractal Code to Watermark Images”, Proc. of ICIP, vol.1, pp.469-473, 1998. [12] T. S. Chen, C.-C. Chang, and M.-S. Hwang, “A Virtual Image Cryptosystem Based upon Vector Quantization”, IEEE Trans. Image Processing, Vol. 7, No.10, pp. 1485-1488,1998 [13] M. Y. Wu and J. H. Lee, A Novel Data Embedding Method for Two-Color Facsimile Images, International Symposium on Multimedia Information Processing, pp.125-130, 1998. [14] M. S. Fu, O. C. Au, “Data Hiding Watermarking for Halftone Images”, IEEE Trans. on Image Processing, Vol. 11, No.4, pp.477-484, 2002. [15] Y.-C. Tseng and H.-K. Pan, "Data Hiding in 2-Color Images", IEEE Trans. on Computers, 51(7), pp. 873-880, 2002. [16] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, "A Secure Data Hiding Scheme for Binary Images", IEEE Trans. on Communications, Vol. 50, No. 8, pp. 1227-31, 2002. [17] N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the Unseen”, IEEE Computer, February, pp.26-34,1998. [18] Steganography software for Widows, http://www.jjtc.com/stegoarchive/stego/software.html [19] R. Machado, EZ Stego, [http://www.stego.com] [20] J. Fridrich,” A New Steganographic Method for Palette-Based Images”, IS&T PICS, Savannah, Georgia, April 25-28, pp. 285-289, 1999. [21] J. Fridrich and R. Du,” Secure Steganographic Methods for Palette Images”, Proc. The 3rd Information Hiding Workshop, LNCS vol. 1768, Springer-Verlag, New York, pp. 47-60, 2000. [22] A. Westfeld and A. Pfitzmann,”Attacks on Steganographic Systems”, Proc. The 3rd Information Hiding Workshop, LNCS vol. 1768, Springer-Verlag, New York, pp. 61-75, 2000. [23] J. Fridrich, M. Goljan and D. Hogea, “Steganalysis of JPEG Images: Breaking the F5 Algorithm”, 5th Information Hiding Workshop, Noordwijkerhout, The Netherlands, pp. 310-323, 2002. [24] N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking-Attacks and Countermeasures. Kluwer Academic Publishers, Boston, 2000. [25] N. F. Johnson and S. Jajodia,” Steganalysis of Images Created Using Current Steganography Software”, Proc. The Second Information Hiding Workshop, LNCS vol. 1525, Springer-Verlag, 1998, pp. 273-289 [26] N. Provos and P. Honeyman,”Detecting Steganographic Content on the Internet”, CITI Technical Report 01-11, 2001. http://www.citi.umich.edu/techreports/reports/citi-tr-01-11.pdf [27] I. J. Cox, M.L.Miller, and J. A. Bloom, Digital Watermarking. New York: Morgan Kaufmann, 2002. [28] M. Kutter and F. A. P. Petitcolas, “A fair benchmark for image watermarking systems,” in Proc. Security and Watermarking of Multimedia Contents, Jan. 1999, pp.226-239 [29] I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia, “IEEE Trans. Image Processing, vol. 6,pp. 1672-1687, Dec.1997. [30] C. S. Lu, S.K. Huang, C.J.Sze, and H.Y.M. Liao,” Cocktail watermarking for digital image protection, ”IEEE Trans. Multimedia, vol. 2, pp.209-224,Dec. 2000. [31] C.T.Hsu and J.L. Wu Multiresolution watermarking for digital images,” IEEE Trans. Circuits syst. II,vol. 45, pp 206-216, Aug 1998. [32] Chiou-Ting Hsu; Ja-Ling Wu;”Hidden digital watermark in images,”IEEE Trans. Image Processing, vol.8, pp. 55-68,Jan.1999. [33] J. Haung, Y.Q. Shi, and Y. Shi, “ Embedding image watermarks in DC components,” IEEE trans. Circuits Syst. Video Technol., vol. 10, pp. 974-979, Sept. 2000. [34] P.H.W.Wong, O.C.Au, and J.W.C.Wong, “ Image watermarking using spread spectrum technique in log-2-spatio domain,” in Proc. IEEE Int. Symp. Circuits and Systems, vol. 1, May 2000, pp. 224-227. [35] F. Hartung, Digital Watermarking and Fingerprinting of Uncompressed and compressed Video, Germany : Shaker Verlag, 2000 [36] C.S.Lu and H.Y.Liao, “ Multipurpose watermarking for image authentication and protection,” IEEE Trans. Image Processing, vol.10, pp.1579-1592, Oct. 2001 [37] J.R. Hernandez, F.P. Gonzalez, J.M. Rodriguez, and G.. Nieto, “Performance analysis of a 2-d-multipulse amplitude modulation scheme for data hiding and watermarking of still images,” IEEE J.Select. Areas Commun., vol. 16, pp.510-524, May 1998. [38] J.R. Hernandez, M. Amado, and F. Perez- Gonzalez, “DCT-domain watermarking techniques for still images : detector performance analysis and a new structure,“ IEEE Trans. Image Processing, vol.9, pp55-68, Jan,2000. [39] G.G.Langelaar and R.lagedijk, “Optimal differential energy watermarking of DCT encoded images and video,“ IEEE Trans. Image Processing, vol. 10, pp. 148-158, Jan.2001. [40] P.W. Wong and N. Memon, “Secrete andpublic key image watermarking schemes for image authentication and ownership verification,” IEEE Trans. Image Processing, vol. 10, pp.1593-1601, Oct. 2001. [41] Y.J. Zhang, T. Chen, and J. Li, “Embedding watermarks into both DC and AC components of DCT,” in Proc.SPIE Security and Watermarking of Multimedia Contents III, Jan.2001, pp.424-435. [42] C.Y.Lin, M.Wu, J.A.Bloom, I,J,Cox, M.L.Miller, andY. M. Lui.” Rotation, scale, and translatio resilient watermarking for images,” IEEE Trans. Image Processing, vol. 10, pp.767-782, May 2001. [43] V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT domain,” IEEE Trans. Image Processing, vol. 10, pp. 1741-1753, Nov.2001. [44] V. Licks and R. Jordan, “On digital image watermarking robust to geometric transformation,” in Proc. IEEE Int. Conf. Image Processing, vol. 3, Sept. 2000, pp.690-693. [45] S. Stankovic, I. Djurovice, and I. Pitas, “Watermarking in the space/ spatial-frequency domain using two-dimensional Randon-Wigner distribution, “IEEE Trans. Image Processing, vol. 10, pp.650-658, Apr. 2001. [46] H. S. Kim, H. K. Lee,”Invariant Image Watermark Using Zernike Moments”, IEEE Trans. On Circuit and Systems for Video Technology, Vol. 13, No.8, pp.766-775,2003. [47] P. Bas, J.-M. Chassery, B. Macq, “Geometrically Invariant Watermarking Using Feature Points”. IEEE Trans. On Image Processing. Vol.11, No. 9, pp. 1014- 1028, 2002. [48] Y. Choi and K. Aizawa, “Digital watermarking using inter-block correlation : extension to JPEG coded domain,” in Proc. IEEE Int. Conf. Information Technology: Coding and Computing, Mar. 2000, pp.133-138. [49] W. Luo, G. L. Heileman, and C.E. Pizano, “Fast and robust watermarking of JPEG files,” in Proc. IEEE 5th Southwest Symp. Image Analysis and Interpretation, April 2002, pp.158-162. [50] S. Arena, M.Caramma, and R.Lancini, “Digital watermarking applied to MPEG-2 coded video sequences exploiting space and frequency masking, “in Proc. IEEE Int. Conf. Image Processing, vol. 1,Sept. 2000, pp.438-441. [51] Swanson, M.D., Zhu, B., Chau, B., Tewfik, A.H., 1997. Object-based transparent video watermarking. IEEE Workshop on Multimedia Signal Processing, Princeton, NJ, USA, June 1997, pp.369-374. [52] Piva, A., Caldell, R., Rosa, A.D., 2000. A DWT - based object watermarking system for MPEG-4 video streams. Proc. IEEE Int. Conf. On Image Processing, Vancouver, Canada, Sep. 2000. vol. 3, pp.5-8. [53] Guo, H., Shi, P.F., 2002. Object-based watermarking scheme robust to object manipulations, Electronics Letters , 38 (25),1656 –1657. [54] Lu, C.S., Liao, H.Y.M., 2001. Video object-based watermarking: a rotation and flipping resilient scheme, Proc. ICIP 2, 483 –486. [55] D. C. He and L. Wang,”Texture Unit, texture spectrum and texture analysis”, IEEE Trans. On Geoscience and Romote Sensing, vol. 28, pp.509-512, 1990. [56] C.L. Gilchrist, J.Q. Xia, L.A. Setton, E.W. Hsu, “High-resolution determination of soft tissue deformations using MRI and first-order texture correlation”, IEEE Transactions on Medical Imaging”, vol.23, pp. 546-553, 2004 [57] T. Gevers,” Image segmentation and similarity of color-texture object”, IEEE Transactions on Multimedia, Vol. 4, No. 5,pp.509-516, 2002 [58] S. Liapis and G.. Tziritas,” Color and texture image retrieval using chromaticity histograms and wavelet frames”, IEEE Transactions on Multimedia, Vol. 4, No. 5, pp.676-686, 2004 [59] S.Peleg, J.Naor, R.Hartley, and D.Avnir, “Multiple resolution texture analysis and classification”, IEEE Trans.PAMI, vol. 6, pp. 518-523, 1984. [60] T.R. Reed and J.M. Du Buf,”A review of recent textures segmentation and feature extraction techniques”, CVGIP: Image Understanding, vol. 57, pp.359-372, 1993. [61] D. C. He and L. Wang,” Texture classification using texture spectrum”, Pattern Recognition vol. 23, pp.905-910, 1990 [62] J.S. Weszka, C.R.Dyer and A. Rosenfeld,”A comparative study of texture measure for terrain classification”, IEEE Trans. MSC, vol. 6, pp. 269-285, 1976. [63] P.Brodatz, Textures: A photographic album for artists and designers. Reinhold, New York, 1968.
|