|
參考文獻 [1]http://www.asianpacific.com.tw/html/posession.htm [2]P.Bassia, and I.Pitas, “Robust audio watermarking in the time domain,” EUSIPCO, pp.25-28, 1998. [3]Chiou-Ting Hsu and Ja-Ling Wu, “DCT-Based Watermarking for Video,” IEEE Trans. on Consumer Electronics, Vol.44, No.1, pp.206-216, Feb.1998. [4]Chiou-Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in Image," IEEE Trans. Image Processing, vol.8 pp.58-68, Jan. 1999. [5]Chun-Shien Lu, Shih-Kun Huang, Chwen-Jye Sze, Hong-Yuan Mark Liao, “Cocktail Watermarking for Digital Image Protection,” IEEE Trans. on Multimedia, vol.2, no.4, pp.209-224, Dec. 2000. [6]Stéphane Bounkong, Borémi Toch, David Saad, David Lowe, "ICA for Watermarking Digital Images," Journal of Machine Learning Research 4, pp.1471-1498, 2003 [7]R.G. van Schyndel, A.Z. Tirkel, C.F. Osbome, “A Digital Watermark,” in Proc ICIP94, IEEE Int. Conf. Image Processing, vol.2, pp.86-90, 1994. [8]W. Bender, D. Gruhl, N. Morimoto, A. Lu, “Techniques for Data Hiding,” IBM System Journal, Vol.35, No.3 and 4, pp.313-336, 1996. [9]T.-S. Chen, C.-C. Chang, M.-S. Hwang, “Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Trans. on Image Processing, vol.7, No.10, pp.1485-1488, Oct. 1998. [10]I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol.6, pp. 1673-1687, 1997. [11]Eckhard Koch and Jian Zhao, “Towards robust and hidden image copyright labeling,” in IEEE international Workshop on Nonlinear Signal and Image Processing, pp.452-455, Marmaras, Greece, Jun. 1995. [12]Chuan-Fu Wu, Wen-Shyong Hsieh,“Image refining technique using digital watermarking,” IEEE Trans. on. Consumer Electronics, vol 46, Issue 1, pp.1-5, Feb. 2000. [13]C.T. Hsu, J.L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. on Circuits and Systems II: Analog and Digital Signal Processing, vol. 45, Issue 8, pp.1097-1101, Aug. 1998. [14]Houng-Jyh Wang, Po-Chyi Su, and C.-C. Jay Kuo, “Wavelet-based digital image watermarking,” Optics Express,vol.3, No.12, pp.491-496, Dec. 1998. [15]Xiang-Gen Xia, Charles G. Boncelet and Gonzalo R. Arce, “Wavelet transform based watermark for digital images,” Optics Express, vol.3, No.12, pp.497-507, Dec. 1998. [16]Liehua Xie and Gonzalo R. Arce., “Joint wavelet compression and authentication watermarking,” on Image Processing, ICIP ''98, Chicago, IL, USA, 1998. [17]C.S. Lu, S.K. Huang, C.J. Sze, and H.Y.M. Liao., “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, pp.209-224, Dec. 2000. [18]Shih-Hao Wang; Yuan-Pei Lin, “Wavelet tree quantization for copyright protection watermarking,” IEEE Tran. on Image Processing ,pp.154- 165, vol.13, Issue: 2, Feb. 2004. [19]Lei Shi, Fan Hong, Guo-Hua Cui,”A quantization-based digital watermarking robust to geometrical transformation,” IEEE 2003 International Conference on Machine Learning and Cybernetics (ICMLC), vol. 5, pp.2826-2830, Nov. 2003. [20]X. Kang, J. Huang, YQ Shi, and Y. Lin, “A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression,” IEEE Trans.on CSVT, vol 13, no. 8, pp. 776-786, Aug. 2003. [21]B. Mandelbrot, “The Fractal Geometry of Nature,” San Francisco, CA: Freeman, 1982. [22]M. F. Barnsley, “Fractals Everywhere,” Academic Press, San Diego, 1988. [23]M. F. Barnsley and A. Sloan "A better way to compress images," BYTE Magazine, pp.215~223,Jan 1998. [24]Yuval Fisher, E. W. Jacobs, and R.D. Boss, “Iterated Transformation image compression,” NOSC Thec. Rep. TR-1408, Naval Oceans Systems Center, San Diego, CA, 1991. [25]A.E. JACQUIN, “Image Coding based on a fractal theory of iterated contractive image transformation,” IEEE Trans. on Image Process, 1992. [26]Dušan Levický, Peter Foriš, ”Some Modification of Fractal Image Coding and Digital Watermarking,” IEEE ICIT, Maribor, Slovenia, pp. 946, 2003. [27]Y. Fisher, ”Fractal Image Compression: Theory and Application,” Springer – Verlag New York, 1995. [28]Puate, J. and Jordan, F. ”Using Fractal Compression Scheme to Embed a Signature into an Image.” Proceedings of the SPIE Photonics East’96 Symposium, 108–118, 1996. [29]Yao Zhao, Qiang Ma, Baozong Yuan, “Digital Watermark Based on LIFS,” Proceedings of the IEEE International Conference on Image Processing ICIP''00, pp. 1281-1284, 2000. [30]Hsien-Chu Wu, Chin-Chen Chang, “Hiding digital watermarks using fractal compression technique,” Fundamenta Informaticae, vol.58, no.2, pp.189-202, Nov. 2003. [31]G. Li, Y. Zhao, and B. Yuan, “Using the fractal code to watermark images,” 2002 6th International Conference on Signal Processing, vol. 1, pp.829-832, 2002. [32]Arnaud E. Jacquin, “A Fractal Theory of Iterated Markov Operators with Applications to Digital Image Coding,” Ph.D. Thesis, Georgia Institute of Technology, 1989. [33]Gaurav Aggrwal, Ashwin T. V., ans Sugata Ghosal, “An Image Retrieval System With Automatic Query Modification,” IEEE Trans. on Multimedia, Vol. 4, NO. 2, Jun. 2002. [34]Young Deok Chum, “Image retrieval using BDIP and BVLC moments,” IEEE Trans. on circuits and systems for video technology, vol. 13, no. 9, 2003. [35]John Y. Chiang, Z. Z. Tsai, “Image based on Fractal Signatures,” National Computer Symposium in Taichung, 2003. [36]O. Maron and T. Lozano-P´erez, “A framework for multiple-instance learning,” in Advances in Neural Information Processing Systems, Vol. 10, pp. 570-576, 1997. [37]http://www.ulead.com.tw/pi/runme.htm [38]http://ict.ewi.tudelft.nl/vcdemo [39]Ya-Ling Wang,”Multiple-Instance Learning Image Database Retrieval employing Orthogonal Fractal bases,” Master’s Thesis, Department of Computer Science and Engineering, National Sun Yat-sen University, Jul. 2004
|