|
參考文獻 [1]Barni M., Bartolini F., Cappellini V., Piva A., “A DCT-domain system for robust image watermarking”, Signal Processing Vol. 66, 1998, pp. 357-372. [2]Chan C. K., Cheng L. M., “Hiding data in images by simple LSB substitution”, Pattern Recognition, Vol. 37, 2004, pp. 469-474. [3]Cox J., Miller L., Bloom A., “Digital watermarking”, San Francisco: Morgan Kaufmann Publishers, 1999. [4]Dietl W., Meerwald P., Uhl A., “Protection of wavelet-based watermarking systems using filter parametrization”, Signal Processing, Vol. 83, 2003, pp. 2095-2116. [5]Fei C., Kundur D., Kwong R., “Analysis and design of secure watermark-based authentication systems”, IEEE Transactions on Information Forensics and Security, Vol. 1, 2006, pp. 43-55. [6]Gonzalez C., Woods E., “Digital image processing”, New Jersey: Prentice Hall, 2002. [7]Hsu C. T., Wu J. L., “Hidden digital watermarks in images”, IEEE Transactions on Image Processing, Vol. 8, No. 1, 1999, pp. 58-68. [8]Hsu C. T., Wu J. L., “Multiresolution watermarking for digital images”, IEEE Transactions on Circuits and Systems II: Analog and digital Signal Processing, Vol. 45, No. 8, 1998, pp. 1097-1101. [9]Inoue H., Miyazaki A., Yamsmoto A., Katsuea T., “A digital watermark technique based on the wavelet transform and its robustness on image compress and transformation”, EICE Transaction on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E82-A, No. 1, 1999, pp. 2-10. [10]Katzenbeisser S., Petitcolas A. P., “Information hiding techniques for steganography and digital watermarking”, Boston: Artech House Publishers, 2000. [11]Kim C., “Content-based image copy detection”, Signal Processing: Image Communication, Vol. 18, 2003, pp. 169-184. [12]Kundur D., Hatzinakos D., “Digital watermarking for telltale tamper-proofing and authentication”, Proceedings of the IEEE Special Issue on Identification and Protection of Multimedia Information, Vol. 87, No. 7, 1999, pp. 1167-1180. [13]Kundur D., Hatzinakos D., “Semi-blind image restoration based on telltale watermarking”, Proc. 32nd Asilomar Conference on Signals Systems and Computers, Vol. 2, 1998, pp. 933-937. [14]Kundur D., Hatzinakos D., “Towards a telltale watermarking technique for tamper-proofing”, Proc. IEEE Int. Conf. On Image Processing, Vol. 2, 1998, pp. 9-13. [15]Lee W. B., Chen T. H., “A public verifiable copy protection technique for still images”, The Journal of Systems and Software, Vol. 62, 2002, pp. 195-204. [16]Mao W., “Modern Cryptography: Theory and Practice”, Indiana: Prentice Hall, 2004. [17]Paqueta H., Wardb K., Pitasc I., “Wavelet packets-based digital watermarking for image verification and authentication”, Signal Processing Vol. 83, 2003, pp. 2117-2132. [18]Podilchuk I., Zeng W., “Image-adaptive watermarking using visual models”, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 1998, pp. 525–539. [19]Si H., Li C. T., “Fragile watermarking scheme based on the block-wise dependence in the wavelet domain”, Multimedia and security, 2004, pp. 214-219. [20]Suhail M. A., Obaidat M. S., Ipson S. S., Sadoun B., “A comparative study of digital watermarking in JPEG and JPEG 2000 environments”, Information Sciences, Vol. 151, 2003, pp. 93-105. [21]Su K., Kundur D., Hatzinakos D., “Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance”, IEEE Transactions on Multimedia, Vol. 7, No. 1, 2005, pp. 52-66. [22]Wang Y. L., Alan P., “Blind image data hiding based on self reference”, Pattern Recognition Letters, Vol. 25, 2004, pp. 1681-1689. [23]Wayner P., “Disappearing cryptography”, San Francisco: Morgan Kaufmann Publishers, 2002. [24]Zhang X. D., Feng J., Lo K. T., “Image watermarking using tree-based spatial-frequency feature of wavelet transform”, Visual Communication and Image Representation, Vol. 14, 2003, pp. 474-491. [25]Zeng W., “Digital watermarking and data hiding: technologies and application”, Proceedings of the International Conference on Information System, Analysis and Synthesis, Vol. 3, 1998, pp. 223-229.
|