|
[1]C. H. Lin, J. S. Jen, and L. C. Kuo, “Distributed Discrete Wavelet Transformation for Copyright Protection,” The 7th International Workshop on Image Analysis for Multimedia Interactive Services, Incheon Korea, April 19-21 2006, pp.53-56. [2]D.V.S. Chandra, “Digital Iimage Watermarking Using Singular Value Decomposition” The 45th Midwest Symposium on Circuits and Systems (MWSCAS-2002), Vol.3, Aug. 2002, pp.III-264 - III-267. [3]D. Y. Chen, M. Ouhyoung, and J. L. Wu, “A Shift Resisting Public Watermark System for Protecting Image Processing Software,” IEEE. Transactions on Consumer Electronics, Vol. 46, No. 3, 2000, pp. 404-414. [4]B. Pfitzmann, “Information Hiding Terminology,” The First Workshop of Information Hiding, Lecture Notes in Computer Science, Cambridge UK, Vol.1174, May30-June1, 1996, pp 347-350. [5]F.A.P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information Hiding -A Survey” The IEEE, Vol.87, No.7, July 1999, pp.1062-1078. [6]O. Dabeer., K. Sullivan, U. Madhow, S. Chandrasekaran, and B.S. Manjunath “Detection of Hiding in the Least Significant Bit,” IEEE Transactions on Signal Processing ,Vol. 52, Issue 10, Part 2, October 2004, pp.3046-3058. [7]R. Chandramouli. and N. Memon, “Analysis of LSB Based Image Steganography Techniques,” International Conference on Image Processing, Vol. 3, October 7-10, 2001, pp.1019-1022. [8]M.U. Celik, G. Sharma, A.M. Tekalp, and E. Saber, “Lossless Generalized-LSB Data Embedding,” IEEE Transactions on Image Processing, Vol. 14, Issue 2, February 2005, pp.253-266. [9]N. Cvejic, and T. Seppanen, “Increasing Robustness of LSB Audio Steganography Using A Novel Embedding Method,” International Conference on Information Technology: Coding and Computing(ITCC 2004), Vol. 2, 2004, pp. 533 - 537. [10]H. C. Wu, N. I. Wu, C. S. Tsai,and M. S. Hwang, “Image Steganographic Scheme Based on Pixel-value Differencing and LSB Replacement Methods,” IEE Proceedings-Vision, Image and Signal Processing, Vol. 152, Issue 5, Octobers 2005, pp.611 - 615. [11]E. Koch and J. Zhao, “Toward Robust and Hidden Image Copyright Labeling,” IEEE Workshop Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995, pp. 452–455. [12]C.T. Hsu and J. L. Wu, “DCT-Based Watermarking for Video,” IEEE Transactions on Consumer Electronics, Vol.44, No.1, February 1998, pp. 206-216. [13]C.F. Wu, W.S. Hsieh, “Digital Watermarking Using Zero Tree of DCT,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, 2000, pp.87-94.(SCI) [14]R.A. Gopinath and C.S. Burrus, “Efficient Computation of the Wavelet Transforms,” International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1990), Vol.3, 1990, pp.1599-1601. [15]I. Daubechies, “The Wavelet Transform: a Method for Time-Frequency Localization,” IEEE Transactions on Information Theory, Vol. 36, September 1990, pp. 961–1005. [16]M. Vetterli and C. Herley, “Wavelet and Filter Banks: Theory and Design,” IEEE Transactions on Signal Processing, Vol. 40, No.9, September 1992, pp.2207-2229. [17]Q. Jin, K.M. Wong, and Z. Q. Luo, “Design of an Optimum Wavelet for Cancellation of Long Echoes in Telephone,” IEEE-SP International Symposium on Time-Frequency and Time-Scale Analysis, Philadelphia PA, October 1994, pp.488-491. [18]S.G. Mallat, “A Theory for Multiresolution Signal Decomposition: The Wavelet Representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 11, No. 7, July 1989, pp. 674-693. [19]V. V. F. Guzman, M. N. Miyatake,and H. M. H. Meana, “Analysis of a Wavelet-based Watermarking Algorithm,” The 14th International Conference on Electronics, Communications and Computers (CONIELECOMP 2004), 16-18 Feb. 2004, pp.283-287. [20]S. Wang, D. Zheng, J. Zhao, W. J. Tam, and F. Speranza, “A Digital Watermarking and Perceptual Model Based Video Quality Measurement,” IEEE Instrumentation and Measurement Technology Conference (IMTC 2005), Vol. 3, 16-19 May 2005, pp. 1729-1734. [21]Y. J. Wu and S. himamoto, “A Study on DWT-Based Digital Audio Watermarking for Mobile Ad Hoc Network,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 2, 05-07 June 2006, pp. 247-251. [22]M. Antonini, M. Barlaud, P. Mathieu and I. Daubechies, “Image Coding Using Wavelet Transform,” IEEE Transactions on Image Processing, Vol. 1, No. 2, April 1992, pp. 205-220. [23]M.Craizer, E. A. B. D. Silva, and E. G.Ramos, “Convergent Algorithms for Successive Approximation Vector Quantization with Applications to Wavelet Image Compression,” IEE on Image and Signal Processing, Vol. 146, No.3, June 1999, pp. 159-164. [24]A. Munteanu, J. Cornelis, G. Van der Auwera and P. Cristea, "Wavelet Image Compression - The Quadtree Coding Approach," IEEE Transactions on Information Technology in Biomedicine, Vol. 3, 1999, pp. 176-185. [25]J.M. Shapiro, “Embedded Image Coding Using Zerotrees of Wavelet Coefficients,” IEEE Transactions on Signal Processing, Vol. 41, December 1993, pp. 3445–3463. [26]R. S. Stankovic and B. J. Falkowski, “The Haar Wavelet Transform: Its Status and Achievements,” Computers and Electrical Engineering, Vol. 29, No. 1, Netherlands, January 2003, pp. 25-44. [27]H. C. Andrews and C. L. Patterson, “Singular Value Decomposition (SVD) Image Coding,” IEEE Transactions on Communications, April 1976, pp.425-432. [28]N. Garguir, “Comparative Performance of SVD and Adaptive Cosine Transform in Coding Images,” IEEE Transactions on Communications, August 1979, pp. 1230-1234. [29]D. P. O. Leary and S. Peleg, “Digital Image Compression by Outer Product Expansion,” IEEE Transactions on Communications, March 1983, pp. 441-444. [30]C. P. Soo, J. H. Chang, and J. J. Ding, “Quaternion Matrix Singular Value Decomposition and Its Applications for Color Image Processing,” International Conference on Image Processing (CIP 2003), Vol.1, Sept. 14-17, 2003, pp. I-805-I-808. [31]K. Inoue and K. Urahama, “DSVD: A Tensor-based Image Compression and Recognition Method,” IEEE International Symposium on Circuits and System (ISCAS 2005), Vol. 6, 23-26 May, 2005, pp.6308-6311. [32]M. Tian, S. W. Luo, and L. Z. Liao, “An Investigation into Using Singular Value Decomposition as A Method of Image Compression,” International Conference on Machine Learning and Cybernetics, Vol. 8, 18-21 Aug., 2005, pp.5200-5204. [33]R. Liu and T. Tan, “An SVD-based Watermarking Scheme for Protecting Rightful Ownership” IEEE Transactions on Multimedia, Vol.4, Issue 1, March 2002, pp.121-128. [34]X. Tang, L. Yang, H. Yue, and Z. Yin, “A Watermarking Algorithm Based on the SVD and Hadamard Transform,” International Conference on Communications, Circuits and Systems, Vol. 2, May 27-30, 2005, pp.877. [35]S. Lee, D. Jang, and C. D. Yoo, “An SVD-Based Watermarking Method for Image Content Authentication with Improved Security,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), Vol.2, March 18-23, 2005, pp.525-528. [36]L. Ma,C. Li, and S. Song, “Digital Watermarking of Spectral Images Using SVD in PCA-Transform Domain,” IEEE International Symposium on Communications and Information Technology (ISCIT 2005), Vol. 2, Oct. 12-14, 2005, pp. 1489-1492. [37]H. Ozer and B. Sankur, “An SVD Based Audio Watermarking Technique,” IEEE 13th on Signal Processing and Communications Applications Conference, May 16-18, 2005, pp. 452-455. [38]K. Konstantinides and G. S. Yovanof, “Improved Compression Performance Using SVD-Based Filters for Still Images,” The Society for Imaging Science and Technology (IS&T)/ the International Society for Optical Engineering (SPIE), Vol. 2418, San Jose, CA, February 7-8, 1995, pp. 100-106. [39]T. B. Deng and Y. Nakagawa, “SVD-based Design and New Structures for Variable Fractional-delay Digital Filters,” IEEE Transactions on Signal Processing, Vol. 52, Issue 9, Sept. 2004, pp.2513-2527. [40]S. Redif and T. Cooper, “Paraunitary Filter Bank Design via a Polynomial Singular-Value Decomposition,” IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), Vol. 4, 18-23 March, 2005, pp. iv/613 - iv/616. [41]R. Karkarala and P. O. Ogunbona, “Signal Analysis Using a Multiresolution Form of the Singular Value Decomposition,” IEEE Transactions on Image Processing, Vol. 10, Issue 5, May 2001, pp. 724-735. [42]T. B. Deng, “Variable Fractional-Delay Filter Design Using Weighted-Least-Squares Singular-Value-Decomposition,” The 7th International Conference on Signal Processing (ICSP 2004), Vol. 1, Aug. 31 –Sept. 4, 2004, pp.54-57. [43]M. G. Vozalis and K. G. Margaritis, “Applying SVD on Item-Based Filtering,” The 5th International Conference on Intelligent Systems Design and Applications (ISDA 2005), 8-10 Sept., 2005, pp.464-469. [44]K. Konstantinides, B. Natarajan, G. S. Yovanof, “Noise Estimation and Filtering Using Block-Based Singular Value Decomposition,” IEEE Transactions on Image Processing, Vol.6, Issue 3, March 1997, pp.479 - 483. [45]E. Ganic and A. M. Eskicioglu, “Robust DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies,” ACM Multimedia and Security Workshop 2004, Magdeburg Germany, September 20-21, 2004, pp. 166-174.
|