|
參考文獻
[1] L. H. Chen, J. J. Lin, “Mean quantization based image watermarking,” Image and Vision Computing, Vol. 21 (2003) 717-727. [2] Y. W. Kim, Oh Il-Seok, “Watermarking text document images using edge direction histograms,” Pattern Recognition Letters, Vol. 25 (2004) 1243-1251. [3] J. L. Liu, D. C. Lou, M. C. Chang, H. K. Tso, “A robust watermarking scheme using self-reference image,” Computer Standards & Interfaces, Vol. 28 (2006) 356-367. [4] I. J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6 (1997) 1673-1687. [5] M. Barni, F. Bartolini, V. Cappellini, A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, Vol. 66 (1998) 357-372. [6] C. I. Podilchuk, “Image-Adaptive Watermarking Using Visual Models,” IEEE Journal on Selected Areas in Communications, Vol. 16 (1998) 525-539. [7] W. Zeng, B. Liu, “A Statistical Watermark Detection Technique Without Using Original Images for Resolving Rightful Ownerships of Digital Images,” IEEE Transactions on Image Processing, Vol. 8 (1999) 1534-1548. [8] M. Barni, F. Bartolini, A. Piva, “Improved Wavelet-Based Watermarking Through Pixel-Wise Masking,” IEEE Transactions on Image Processing, Vol. 10 (2001) 783-791. [9] V. Fotopoulos, A.N. Skodras, “Improved watermark detection based on similarity diagrams,” Signal Processing: Image Communication, Vol. 17 (2002) 337-345. [10] M. A. Suhail, M. S. Obaidat, “Digital Watermarking-Based DCT and JPEG Model,” IEEE Transactions on Instrumentation and Measurement, Vol. 52 (2003) 1640-1647. [11] D. Zhao, G. Chen, W. Liu, “A chaos-based robust wavelet-domain watermarking algorithm,” Chaos Solitons and Fractals, Vol. 22 (2004) 47-54. [12] X. M. Niu, Z. Ming, S. H. Siin, “DIGITAL WATERMARKING OF STILL IMAGES WITH,” IEEE Transactions on Cosumer Electronics, Vol. 46 (2000) 137-145. [13] A. Noore, N. Tungala, M. M. Houck, “Embedding biometric identifiers in 2D barcodes for improved security,” Computers & Security, Vol. 23 (2004) 679-686. [14] H. C. Wu, C. C. Chang, “A novel digital image watermarking scheme based on the vector quantization technique,” Computers & Security, Vol. 24 (2005) 460-471. [15] R. Agrawal, T. Imielinski, A. Swami, “Mining Association Rules between Sets of Items in Large Databases,” Proc. Of ACM Special Interest Group on Management of Data, ACM SIGMOD’93, Vol. 22 (1993) 207-216. [16] R. Srikant, R. Agrawal, “Mining generalized association rules,” Future Generation Computer Systems, Vol. 13 (1997) 161-180. [17] A. Savasere, E. Omiecinski, S. Navathe, “An efficient algorithm for mining association rules in large databases,” In Proceedings of the VLDB, Zurich, Switzerland, (1995) 432-444. [18] M. J. Zaki, “Scalable algorithms for association mining,” IEEE Transactions on Knowledge and Data Engineering, Vol. 12 (2000) 372-390. [19] G. Chen, Q. Wei, D. Liu, G. Wets, “Simple association rules (SAR) and the SAR-based rule discovery,” Computer and Industrial Engineering, Vol. 43 (2002) 721-733. [20] L. Feng, T. Dillon, J. Liu, “Inter-transactional association rules for multi-dimensional contexts for prediction and their application to studying meteorological data,” Data and Knowledge Engineering, Vol. 37 (2001) 85-115. [21] R. Agrawal, R. Srikant, ”Fast Algorithms for Mining Association Rules,” Proc. Of the 20th International Conference on Very Large Data Bases, VLDB’94, (1994) 487-499. [22] H. Kii, J. Onishi, S. Ozawa, “The digital watermarking method by using both patchwork and DCT,” IEEE Multimedia Computing and System, Vol. 1 (1999) 895-899. [23] A. B. Watson, “DCT quantization matrices visually optimized for individual images,” Human Vision Visual Processing and Digital Display IV Proc. SPIE, Vol. 1913 (1993) 202-216. [24] R. C. Gonzalez, R. E. Woods, “Digital Image Processing 2/e,” Pearson Education, (2002). [25] N. Kanopoulos, N. Vasanthavada, R. L. Baker, “Design of and image edge detection filter using the Sobel operator,” IEEE Journal of solid-state circuits, Vol. 23 (1988) 358-367. [26] T. Pavlidis, J. Swartz, Y. P. Wang, “Information encoding with two dimensional bar codes,” Computer, Vol. 25 (1992) 18-28. [27] R. M. Gray, “Vector Quantization,” IEEE ASSP Magazine, Vol. 1 (1984) 4-29. [28] Y. C. Hu, C. C. Chang, “A Progressive Subcodebook Search Algorithm for Vector Quantization,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Beijing, China, Vol. 2 (1999) 936-939. [29] 張真誠, 黃國峰, 陳同孝, “電子影像技術,” 松崗電腦圖書資料股份有限公司, (2000). [30] T. Pavlidis, “A new paper/computer interface: two-dimensional symbologies,” IEEE international conference on pattern recognition, Vol. 2 (2000) 145-151. [31] L. O’Gorman, I. Rabinovich, “Secure identification documents via pattern recognition and public-key cryptography,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20 (1998) 1097-1102. [32] L. O’Gorman, T. Pavlidis, “Auto ID technology: from barcodes to biometrics,” IEEE Robotics and Automation Magazine, Vol. 6 (1999) 4-16. [33] S. Chow, N. Serinken, S. Shlien, “Forgery and tamper-proof identification document,” Proceedings of IEEE international carnahan conference on security technology, (1993) 11-14. [34] D. Ross, “Back on the cards,” IEE Review, Vol. 49 (2003) 22-23. [35] A. Vaidya, “Keeping card data secure at low cost,” European Convention on Security and Detection May, (1995) 212-215.
|