|
[1] P. Bao and X. Ma, “Image adaptive watermarking using wavelet domain singular value decomposition,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 15, 2005, pp. 96-102. [2] W. Bender, D. Gruhl, N. Morimoto and A. Lu, “Techniques for data hiding,” IBM System Journal, Vol. 35, No. 3-4, 1996, pp. 313-337. [3] M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Transactions on Image Processing, Vol. 14, No. 2, 2005, pp. 253-266. [4] T. S. Chen, C. C. Chang and M. S. Hwang, “A virtual image cryptosystem based upon vector quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, 1998, pp. 1485-1488. [5] L. H. Chen and J. J. Lin, “Mean quantization based image watermarking,” Image and Vision Computing, Vol. 21, 2003, pp. 717-727. [6] R. J. Chen, W. K. Lu and J. L. Lai, “Image encryption using progressive cellular automata substitution and SCAN,” Proceedings of the IEEE International Symposium on Circuits and Systems, Kobe, Japan, 2005, pp. 1690-1693. [7] J. F. Delaigle, C. De Vleeschouwer and B. Macq, “Watermarking algorithm based on a human vision model,” Signal Processing, Vol. 66, No. 3, 1998, pp. 319-335. [8] F. Y. Duan and I. King, “A short summary of digital watermarking techniques for multimedia data,” Proceedings of the 1999 Hong Kong International Computer Conference, Hong Kong, Hong Kong Computer Society, 1999. [9] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, Vol. 87, 1999, pp. 1079-1107. [10] D. Kundur and D. Hatzinakos, “Digital watermarking using multiresolution wavelet decomposition,” Proceedings of the International Conference on Acoustic, Speech and Signal Processing, Seattle, Washington, USA, 1998, pp. 2969-2972. [11] S. J. Lee and S. H. Jung, “A survey of watermarking techniques applied to multimedia,” IEEE International Symposium on Industrial Electronics, Vol. 1, Pusan, South Korea, 2001, pp. 272-277. [12] C. T. Li, “Digital fragile watermarking scheme for authentication of JPEG images,” IEE Proceedings - Vision, Image and Signal Process, Vol. 151, 2004, pp. 460-466. [13] Y. Linde, A. Buzo and R. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, Vol. 28, 1980, pp. 84-95. [14] Z. M. Lu, C. H. Liu, D. G. Xu and S. H. Sun, “Semi-fragile image watermarking method based on index constrained vector quantization,” Electronics Letters, Vol. 39, 2003, pp. 35-36. [15] P. Moulin and R. Koetter, “Data hiding codes,” Proceedings of the IEEE, Vol. 93, No. 12, 2005, pp. 2083-2126. [16] Z. Ni, Y. Q. Shi, N. Ansari and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, 2006, pp. 354-362. [17] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information hiding - a survey,” Proceedings of the IEEE, Vol. 87, No. 7, 1999, pp. 1062-1078. [18] R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the Association for Computing Machinery, Vol. 21, No. 2, 1978, pp. 120-126. [19] D. Salomon, “Data compression: the complete reference 3rd edition,” Springer Verlag, 2004. [20] R. Sun, H. Sun and T. Yao, “A SVD and quantization based semi-fragile watermarking technique for image authentication,” Proceedings of the International Conference on Signal Processing, Beijing, China, 2002, pp. 1592-1595. [21] B. Tao and B. Dickinson, “Adaptive watermarking in the DCT domain,” Proceedings of the International Conference on Acoustic, Speech and Signal Processing, Munich, Germany, 1997, pp. 2985-2988. [22] J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, 2003, pp. 890-896. [23] S. H. Wang and Y. P. Lin, “Wavelet tree quantization for copyright protection watermarking,” IEEE Transactions on Image Processing, Vol. 13, No. 2, 2004, pp. 154-165. [24] P. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, Vol. 10, 2001, pp. 1593-1601. [25] Y. T. Wu and F. Y. Shih, “An adjusted-purpose digital watermarking technique,” Pattern Recognition, Vol. 37, 2004, pp. 2349-2359. [26] G. Xuan, C. Yang, Y. Zhen, Y. Shi and Z. Ni, “Reversible data hiding based on wavelet spread spectrum,” Proceedings of the IEEE Multimedia Signal Processing Workshop, Siena, Italy, 2004, pp. 211-214.
|