|
[1] J. Meng and S. F. Chang, “Embedding Visible Video Watermarks in the Compressed Domain,” Proceedings of IEEE International Conference on Image Processing, Chicago, IL, USA, vol. 1, pp. 474-477, Oct. 1998.
[2] M. S. Kankanhalli et al., “Adaptive Visible Watermarking of Images,” Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, vol. 1, pp. 568-573, June 1999.
[3] S. P. Mohanty et al., “A DCT Domain Visible Watermarking Technique for Images,” Proceedings of IEEE International Conference on Multimedia and Expo, New York, NY, USA, vol. 2, pp. 1029-1032, Aug. 2000.
[4] P. M. Chen, “A Visible Watermarking Mechanism using A Statistic Approach,”, Proceedings of IEEE International Conference on Signal Processing, Beijing, China, vol. 2, pp. 910-913, Aug. 21-25, 2000.
[5] H. Y. Chen and W. H. Tsai, “Verification of MPEG Video Contents by Random Signal Hiding,” Proceedings of IPPR Conference on Computer Vision, Graphics, and Image Processing, Kinmen, Taiwan, pp. 692-701, Aug. 16-18, 2003.
[6] M. Schneider and S. F. Chang, “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of IEEE International Conference on Image Processing, Lausanne, Switzerland, vol. 3, pp. 227-230, Sept. 1996.
[7] D. He et al., “An Object Based Watermarking Solution for MPEG4 Video Authentication,” Proceedings of IEEE International Symposium on Acoustics, Speech, and Signal Processing, Hong Kong, vol. 3, pp. 537-540, Apr. 6-10, 2003.
[8] F. Bartolini et al., “Image Authentication Techniques for Surveillance Applications”, Proceedings of the IEEE, vol. 89, issue: 10, pp. 1403-1418, Oct. 2001.
[9] P. Yin and H. H. Yu, “A Semi-fragile Watermarking System for MPEG Video Authentication,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, Florida, USA, vol. 4, pp. 3461-3464, May 2002.
[10] R. Du and J. Fridrich, “Lossless Authentication of MPEG-2 Video,” Proceedings of IEEE International Conference on Image Processing, New York, NY, USA, vol. 2, pp. 893-896, Sept. 2002.
[11] D. A. Winne et al., “Spatial Digital Watermark for MPEG-2 Video Authentication and Tamper Detection,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Orlando, Florida, USA, vol. 4, pp. 3457-3460, May 2002.
[12] J. Dittmann et al., “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, vol. 2, pp. 209-213, June 1999.
[13] H. H. Yu, et al., “Smart Media: Empower Media with Active Data Hiding,” Proceedings of 6th International Computer Science Conference on Active Media Technology, Hong Kong, China, Vol. 2252, pp. 5-16, December 19-29, 2001.
[14] N. K. Lo and W. H. Tsai, “A Study on Active Information Hiding and Applications,” Master Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, June, 2004.
[15] Y. C. Chuang and W. H. Tsai, “Active Information Hiding in FLASH and HTML Files,” Master Thesis, Department of Computer and Information Science, National Chiao Tung University, Hsinchu, Taiwan, June, 2005.
[16] J. J. Chae and B. S. Manjunath, “Data Hiding in Video,” Proceedings of IEEE International Conference of Image Processing, Kobe, Japan, vol. 1, pp. 311-315, Dec 1999.
[17] F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed Video,” Signal Processing, vol. 66, pp. 283-301, 1998.
[18] A. Giannoula and D. Hatzinakos, “Compressive Data Hiding For Video Signals,” Proceedings of IEEE International Conference of Image Processing, Barcelona, Spain, vol. 1, pp. 529-532, Sept. 14-17, 2003.
[19] Y. Wang and A. Pearmain, “Robust Data Hiding in MPEG-2 Video Against Transcoding,” Proceedings of EUROSIP Conference of Video/Image Processing and Multimedia Communications, Zagreb, Croatia, vol. 2, pp. 695-700, July 2-5, 2003.
[20] J. Y. Lee and S. I. Yoo, “An Elliptical Boundary Model for Skin Color Detection,” Proceedings of The International Conference on Imaging Science, Systems, and Technology, Las Vegas, USA, pp. 579-584, June 2002.
|