|
1.Christine I. Podilchuk and Edward J., “Digital watermarking algorithms and applications, ” IEEE Signal Processing Magazine, July 2001. 2.L. Y. Wang and P. C. Lu, “On the Copyright Protection of Digital Image Based on Wavelet Transformation, ” IEEE ICSS 2005 3.L. Holt, B. G. Maufe, and A. Wiener, “Encoded Marking of a Recording Signal”, U.K., Patent GB 2196167A, 1988. 4.D. Hunter, “Handmade Paper and Its Watermarks,” A Bibliography, 1967. 5.W. Sezpanski, “A Signal Theoretic Method for Creating Forgery-proof Documents for Automatic Verification”, in J.S. Jackson, editor, 1979 Carnahan Conference on Crime Countermeasures, Page: 101-109, 1979. 6.F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, Vol. 87, Issue 7, Page: 1079-1107, July 1999. 7.Brassile,J., Low,S., Maxemchuk,N. and O’Gorman,L.: Electronic Marking and Identification Techniques to Discourage Document Copying, Proc. IEEE INFOCOM’94, Vol.3, pp1278-1287, 1994. 8.Nakamura, H. and Matsui, K., “Digital Watermarking onto Japanese Documents by Seal Image,” Trans. of I.P.S.J, Vol.38, No.11, pp2356-2361 ,1997. 9.Kundur, D. and Hatzinakos,D., ”Robust digital image watermarking method using wavelet-based fusion,” Proc. of IEEE Int. Conf. on Image Processing, Vol.1, pp.544-547 , 1997. 10.Xia,X., Boncelet,C.G. and Arce, G.R., “A multiresolution watermark for digital images,” Proc. of IEEE Int. Conf. on Image Processing, Vol.1, pp.548-551, 1997. 11.Ohnishi, J. and Matsui, K., “Embedding a seal into a picture under orthogonal wavelet transform,” Proc. of Int. Conf. on Multimedia Computing and Systems, pp.514-521, 1996. 12.Ohnishi, J. and Matsui, K., “Image coding for copyright protection by using wavelet ,” Trans. of I.P.S.J., Vol.38 No.3, pp.534-539, 1997. 13.Matsui, K., Ohnishi, J. and Nakamura, Y., “Embedding a signature to pictures under wavelet transformation,” Trans. of IEICE, Vol. J-79-D-II, No.6, pp1017-1024, 1996.
14.Pitas, I., “A method for signature casting on digital images,” Proc. IEEE Int. Conf. on Image Processing, Vol.3, pp.215-218, 1996. 15.Wolfgang, R.B. and Delp, E.J., “A watermark for digital images, A method for signature casting on digital images,” Proc. IEEE Int. Conf. on Image Processing, Vol.3, pp.219-222, 1996. 16.Swanson, D.M., Zhu, B., Chau, B. and Tewfik, A.H., “Robust Data Hiding for Images,” Proc. of IEEE Digital Signal Processing Workshop, pp.37-40, 1996. 17.Swanson, D.M., Zhu, B., Chau, B. and Tewfik, A.H., “Multiresolution Video Watermarking using Perceptual Models and Scene Segmentation,” Proc. of IEEE Int. Conf. on Image Processing, Vol.2, pp.558-561, 1997. 18.Yongjian Hu and Kwong S., “Wavelet domain adaptive visible watermarking,” Electronics Letters, Vol. 37, Issue 20, Page: 1219 –1220, 27 Sept. 2001. 19.Pei-Min Chen, “A visible watermarking mechanism using a statistic approach” WCCC-ICSP 2000 5th International Conference on Signal Processing Proceedings, Vol. 2, Page: 910 -913, 2000. 20.Kankanhalli M.S., Rajmohan, and Ramakrishnan K.R, “Adaptive visible watermarking of images,” IEEE International Conference on Multimedia Computing and Systems, Vol. 1, Page: 568 –573, 1999. 21.C. C. Chang, K. F. Hwang, and M. S. Hwang, “Robust authentication scheme for protecting copyrights of images and graphics,” IEE Proceedings on Vision, Image and Signal Processing, Vol. 149, Issue 1, Page: 43-50, Feb. 2002. 22.C. C. Chang, K. F. Hwang, and M. S. Hwang, “A block based digital watermarks for copy protection of images,” APCC/OECC '99, Fifth Asia-Pacific Conference and Fourth Optoelectronics and Communications Conference, vol. 2, pp. 977 –980, 1999. 23.Fulin Su, Guoqiang Ma, and Hongtao Ge, “Robust image watermarking research based on DCT transform,” International Conferences on Info-tech and Info-net, ICII 2001 - Beijing. Vol. 5, Page: 83-88, 2001. 24.C.T. Li, F.M. Yang, and C.S. Lee, “Oblivious fragile watermarking scheme for image authentication” Acoustics, 2002 IEEE International Conference on Speech, and Signal Processing, Vol. 4, Page: 3445 –3448, 2002. 25.Alturki F. and Mersereau R., “Secure fragile digital watermarking technique for image authentication,” 2001 International Conference on Image Processing, Vol. 2, Page: 1031 –1034, 2001.
26.Inoue H., Miyazaki A., and Katsura T., “Wavelet-based watermarking for tamper proofing of still images,” 2000 International Conference on Image Processing, Vol. 2, Page: 88 –91, 2000. 27.Fridrich J., Goljan M., and Baldoza A.C., “New fragile authentication watermark for images,” 2000 International Conference on Image Processing, Vol. 1, Page: 446 –449, 2000. 28.Ohbuchi, R., Masuda, H., Aono, M., “Watermarking three-dimensional polygonal models through geometric and topological modifications,” Selected Areas in Communications, IEEE Journal on Volume 16, Issue 4, May 1998 Page(s):551 - 560 Digital Object Identifier 10.1109/49.668977, 1998. 29.Ashourian, M., Enteshari, R.; Jeon, J., “Digital watermarking of three-dimensional polygonal models in the spherical coordinate system,” Computer Graphics International, 2004. Proceedings 2004 Page(s):590 - 593 Digital Object Identifier 10.1109/CGI.2004.1309270, 2004. 30.Ahourian, M., Zhu, J., Jeorr, J., “A spatial and DCT-domain composite watermarking of three-dimensional triangle meshes,” Haptic, Audio and Visual Environments and Their Applications, 2004. HAVE 2004. Proceedings. The 3rd IEEE International Workshop on 2-3, Page(s):189 – 194, Oct. 2004 31.Yeung, M., Boon-Lock Yeo, “Fragile watermarking of three-dimensional objects,” Image Processing, ICIP 98. Proceedings. 1998 International Conference onVolume 2, 4-7, Page(s):442 - 446 vol.2 Digital Object Identifier 10.1109/ICIP.1998.723416, Oct. 1998. 32.Hao-Tian Wu, Yiu-Ming Cheung, “A fragile watermarking scheme for 3D meshes,” New York, NY, USA, SESSION: Authentication/protocols, Pages: 117 - 124 Year of Publication: 2005 ISBN:1-59593-032-9, 2005. 33.J. L. Mannos, D. J. Sakrison, “The effect of a visual fidelity criterion on encoding of images,” IEEE Trans. Inform. Theory, Vol. IT-20, Page(s):525-536, 1974.
|