|
[1] Paul Bao and Xiaohu Ma, “ Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition”, IEEE Transactions on circuits and systems for video technology, vol. 15, No. 1, pp 96-102 Jan. 2005. [2] Tzung-Her Chen, Gwoboa Horng, Wei-Bin Lee, ”A Publicly Verifiable Copyright-Proving Scheme Resistant to Malicious Attacks”, IEEE Transactions on industrial electronics, vol. 52, NO. 1, pp 327-334 ,Feb. 2005. [3] Shih-Hao Wang and Yuan-Pei Lin, “Wavelet Tree Quantization for Copyright Protection Watermarking”, IEEE Transactions on image processing, vol. 13. No. 2, pp. 154-165, Feb. 2004. [4] Aboofazeli, M., Thomas, G. , Moussavi, Z., “A Wavelet Transform Based Digital Image Watermarking Scheme”, Electrical and Computer Engineering, 2004, Canadian Conference on, vol. 2, pp.823-826, 2-5 May 2004. [5] Yuping Hu, WeiQun Liu, Ying Deng, Wenhua He and Jinggou Dai, “Readable watermarking Algorithm Based on Wavelet Tree Quantization”, IEEE Communications, Circuits and Systems,2004. 2004 International Conference on vol 1, pp.579-583, Jun. 2004. [6] Emir Ganic and Ahmet M. Eskicioglu, “Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies”, ACM, pp.166-174, Sep. 2004. [7] Santi P. Maity, Malay K. Kundu,” A Blind CDMA Image Watermarking Scheme In Wavelet Domain”, Image process, 2004. ICIP’04. 2004 International Conference on, vol. 4, pp 2633-2636, 24-27 Oct. 2004. [8] Hoon Jung; Seok Gang Cho, Sung Shik Koh, Yong Duk Chung, Koo Young, Soo-Yun Lee, Chung Hwa Kim,”Image Watermarking Based On Wavelet Transform Using Threshold Selection”, SICE 2003 Annual Conference, vol. 3, pp. 3009-3012, 4-6 Aug. 2003. [9] Said E. El-Khamy, Mona A. Lotfy and Rowayda A. Sadek,” A New Technique For Perceptual Wavelet Based Image Watermarking”, Nineteenth National Radio Science Conference, Alexandria, pp. 336-343, 19-21 Mar. 2002. [10] C. I. Podilchuk and W. Zeng, “Image-adaptive watermarking using visual models”, IEEE J. Select. Areas Communication, vol. 12, pp. 225-539, May 1998. [11] S-.H. Wang and Y.-P. Lin, “Blind watermarking using wavelet tree quantization”, in Proc. IEEE ICME, vol. 1, pp. 589-592,Aug ,2002. [12] G. C. Langelaar and R. L. Langendijk, “Optimal differential energy watermarking of DCT encoded images and video”, IEEE Trans. Image Processing, vol. 10, pp. 148-158, Jan. 2001. [13] Shapiro, J.M.,” Embedded image coding using zerotrees of wavelet coefficients”, Signal Processing, IEEE Transactions on vol. 41, no. 12, pp. 3445-3462, Dec. 1993. [14] 張真誠, ”資通安全專輯之二---資通安全概論,行政院國家科學委員會科學技術資料中心,Dec. 2002. [15] Tung-Shou Chen, Chin-Chen Chang and Min-Shiang Hwang, “A Virtual Image Cryptosystem Based Upon Vector Quantization”, IEEE Transactions on Image Processing, vol. 7, no. 10, pp.1485-1488, OCT. 1998. [16] Petitcolasm, F. A. P.; Anderson R.J. and Kuhn, M.G., “Information Hiding – A Survey”, Proceedings of the IEEE, vol. 87, pp.1062-1078, July 1999. [17] Pitas, I.,”A method for signature casting on digital images”, image Processing, 1996. Proceedings., International Conference on vol. 3,pp215-218, Sept. 1996. [18] I.J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing vol.6, No. 12, pp. 1673-1687,DEC. 1997. [19] D.Kundur and D. Hatzinakos, “Digital watermarking, using multiresolution wavelet decomposition”, in Proc. IEEE ICASSP, vol. 5, pp.2969-2972, May 1998. [20] H. Inoue, A. Miyazaki, A. Yamsmoto and T. Katsura, “A digital watermark technique based on the wavelet transform and its robustness on image compression and transformation,” IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, vol. E82-A, pp. 2-10, Jan. 1999. [21] Inoue. H., Miyazaki, A., Katsura, T., “ An image watermarking method based on the wavelet transform”, Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on vol. 1, pp. 296-300, 1999. [22] Y.-S. Kim, O.-H. Kown, and R.-H. Park, “Wavelet based watermarking method for digital images using the human visual system”, in Proc. IEEE ISCS, vol. 4, pp.80-83, June 1999. [23] J.M. Zhong and C.H. Leung and Y.Y. Tang, “ Wavelet image coding based on significance extraction using morphological operations,” Vision, Image and Signal Processing, IEE Proceedings. vol. 146, pp.206-210, Oct.1999. [24] Lumini, A., Maio, D.,” A Wavelet-based image watermarking scheme”, Information Technology” Coding and Computing, 2000. Proceedings. International Conference on pp. 122-127, 27-29 March 2000. [25] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. Liao, “Cocktail watermarking for digital image protection”, IEEE Trans. Multimedia, vol. 2, pp. 209-224, Dec. 2000. [26] Barni, M., Bartolini, F., Piva, A., “ Improved Wavelet-Based Watermarking Through Pixel-Wise Masking”, Image Processing, IEEE Transactions on Vol. 10, No. 5, pp. 783-791, May 2001. [27] Ikpyo Hong and Intaek Kim, Seung-Soo Han,” A blind watermarking technique using wavelet transform”, Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium, vol. 3, pp1946-1950, June 2001. [28] C.S. Tsai, C.C. Chang, T. S. Chen and M. H. Chen, ”Embedding robust graylevel watermarks in an image using discrete cosine transformation”, Distributed Multimedia Database: Techniques and Applications, Chapter 13, Idea Group Publishing,PA, pp 206-223,2002. [29] Guorong Xuan, Jiang Zhu, Jidong Chen, Shi, Y.Q., Zhicheng Ni, Wei Su, “Distortionless data hiding based on integer wavelet transform”, Electronics Letters vol. 38, Issue 25, pp.1646-1648, 5 Dec. 2002. [30] F.Y. Shih and S.S.T. Wu, “Combination image watermarking in the spatial and frequency domains”, Pattern Recognition Letters, vol.36, No.4, pp.969-975, April 2003. [31] A. B. Watson, “DCT quantization matrices visually optimized for individual image”, in Proc. SPIE Conf. human Vision, Visual Processing, and Digital Display IV, vol. 1913, pp.202-216, Feb. 1993. [32] F. A. P. Petitcolas. (1997) Weakness of existing watermark scheme. [On-line].Available: http://www.cl.cam.ac.uk/~fapp2/watermarking/imagewatermarking
|