|
[1] W. Bender and D. Gruhl, “Techniques for data hiding,” IBM System Journal, vol. 35, no. 3&4, 1996, pp. 313-336. [2] M. S. Fu and O. C. Au, “Data hiding by smart pair toggling for halftone images,” in IEEE Intl. Conf. Acoustics Speech and Signal Processing, vol. 4, 2000, pp. 2318-2321. [3] M. S. Fu and O.C. Au, “Data hiding watermarking for halftone images,” IEEE Trans. Image Processing, vol. 11, issue. 4, 2002, pp. 477-484. [4] M. S. Fu and O. C. Au, “Correlation-based watermarking for halftone images,” in Proc. Intl. Symp. Circuits and Systems (ISCAS'04), vol. 2, 2004, pp. 21-24. [5] W. E. L. Grimson and T. Lozano-Perez, “Localizing overlapping parts by searching the interpretation tree,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 9, no. 4, 1987, pp. 469-482. [6] D. Gruhl and W. Bender, “Information hiding to foil the casual counterfeiter,” in Proc. 2nd Intl. Workshop on information hiding, Lecture Notes in Computer Science, 1525, Portland, Oregon, Apr. 1998, pp. 1-15. [7] C. Harris and M. Stephens, “A combined corner and edge detector,” in 4th ALVEY Vision Conference, 1988, pp. 147–151. [8] H. Z. Hel-Or, “Watermarking and copyright labeling of printed images,” J. Elect. Imaging, vol. 10, no. 3, Jul. 2001, pp. 794–803. [9] C. Y. Hsu and C. S. Lu, “Geometric distortion-resilient image hashing system and its application scalability,” in Proc. ACM Multimedia and Security Workshop, Magdeburg, Germany, 2004, pp. 81-92. [10] D. Kacker and J. P. Allebach, “Joint halftoning and watermarking,” IEEE Trans. Signal Processing, vol. 51, no. 4, 2003, pp. 1054-1068. [11] F. Koltai and B. Adam, “Enhanced optical security by using information carrier digital screening,” in Prco. SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, Jan. 2004, pp.160-169. [12] C.C. Kuo, T. Kalker, and W. Zhou, “Digital rights management – from the guest editors,” IEEE Signal Processing Magazine, vol. 21, issue 2, Mar. 2004, pp. 11-14. [13] Y. Lamdan and H. J. Wolfson, “Geometric hashing: a general and efficient model-based recognition scheme,” in Proc. 2nd Intl. Conf. Computer Vision, 1988, pp. 238-249. [14] H. Nagashima and K. Saito, “New Security System for ID Certificates in IT Society,” in Prco. SPIE Optical Security and Counterfeit Deterrence Techniques V, vol. 5310, Jan. 2004, pp.142-150. [15] F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information hiding - a survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999. [16] W. K. Pratt, Digital image processing, 2nd Ed, John Wiley & Sons, Inc., 1991. [17] R. L. van Renesse, “Paper based document security-a review,” in European Conference on Security and Detection, 1997, pp.75 – 80. [18] R. L. van Renesse, Optical document security, Artech House, Boston, MA, 1998. [19] A. Secord, W. Heidrich, and L. Streit, “Fast primitive distribution for illustration,”in Proc. 13th Eurographics Workshop on Rendering, Eurographics Association, 2002, pp. 215–226. [20] Y. C. Tseng, Y. Y. Chen, and H. K. Pan, “A secure data hiding scheme for binary images,” IEEE Trans. Communications, vol. 50, no. 8, Aug. 2002, pp. 1227-1231. [21] R. Ulichney, Digital Halftoning, MIT Press, Cambridge, MA, 1987. [22] S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun, “Visual communications with side information via distributed printing channels: extended multimedia and security perspectives,” in Proc. SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI, Jan. 2004, pp. 428–445. [23] N. Vujovic and D. Brzakovic, “Evaluation of an algorithm for finding a match of a distorted texture pattern in a large image database,” ACM Trans. Information Systems (TOIS), vol. 16, issue 1, Jan. 1998, pp. 31-60. [24] H. C. Wang, “Data hiding techniques for printed binary images,” in Proc. Intl. Conf. Information Technology: Coding and Computing, Las Vegas, NV, USA, Apr. 2001, pp. 55-59. [25] H. J. Wolfson and I. Rigoutsos, “Geometric hashing: an overview,” IEEE Computational Science and Engineering, vol. 4, no. 4, 1997, pp. 10–21. [26] M. Wu, W. Trappe, Z. J. Wang, and R. Liu, “Collusion-resistant fingerprinting for multimedia,” IEEE Signal Processing Magazine, Mar. 2004, pp. 15-27.
|