|
[1] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” in Proceedings of the IEEE, Vol.87, No. 7, pp. 1079-1107, July 1999.
[2] C.T. Hsu and J.L. Wu, “Multiresolution watermarking for digital images,” IEEE Trans. Circuits and Systems II: Analog and Digital Signal Processing, Vol. 45, No. 8, pp.1097-1101, August 1998.
[3] C.T. Hsu and J.L. Wu, “Hidden digital watermarks in images,” IEEE Trans. on Image Processing, Vol. 8, No. 1, pp. 58-68, January 1999.
[4] C.W. Ngo, T.C. Pong and R.T. Chin, “Exploiting image indexing techniques in DCT domain,” Pattern Recognition, Vol. 34, No.9, pp 1841-1851, Sep. 2001.
[5] X-G Xia, C.G.Boncelet, and G. R. Arce, “Wavelet Transform Based Watermark for Digital Images,” Optics Express, Vol. 3, No. 12, pp. 497-511, Dec. 1998.
[6] D. Kundur and D. Hatzinakos, “Digital watermarking for telltale tamper proofing and authentication,” in Proceedings of the IEEE, Vol. 87, No. 7, pp. 1167-1180, July 1999.
[7] J. Fridrich, “Image watermarking for tamper detection,” in Proceedings of International Conference on Image Processing, Chicago, IL, Vol. 2, pp. 404-408, Oct. 1998.
[8] A. Wakatani, “Digital watermarking for ROI medical images by using compressed signature image,” in Proceedings of the International Conference on System Sciences, Hawaii, America., Vol. 6, pp. 2043-2048, Jan. 2002.
[9] B. M. Planitz,, A. J. Maeder, “A Study of Block-Based Medical Image Watermarking Using a Perceptual Similarity Metric,” in Proceedings of the Digital Imaging Computing: Techniques and Applications, Cairns, Australian, pp. 483-490, Dec. 2005.
[10] H. R. Lee and K. H. Rhee, “Reversible data embedding for tamper-proof watermarks,” in Proceedings of the International Conference on Innovative Computing, Information and Control, Beijing, China, Vol. 3, pp. 487-490, August 2006.
[11] I. Kim, S.S. Han and J.H. Shin, “An improved tamper- detection method for digital images,” in Proceedings of IEEE International Symposium on Industrial Electronics, Pusan, Korea, Vol. 1, pp. 227-231, June 2001.
[12] K.F. Li, T.S. Chen and S.C. Wu, “Image tamper detection and recovery system based on discrete wavelet transformation,” in Proceedings of the International Conference on Communications, Computers and Signal Processing, Victoria, BC, Vol. 1, pp. 164-167, August 2001.
[13] T.S. Chen, J. Chen and J.G Chen, “Tamper Detection and Retrieval Technique Based on JPEG2000 with LL Subband,” in Proceedings of the International Conference on Networking, Sensing and Control, Taipei, Taiwan, Vol. 2, pp. 1235-1240, March 2004.
[14] Z.D. Gu, “Image Tamper Proofing and Recovery Technique Based on DWT”, Master thesis, CSIE, National Dong Hwa University, Hualien, Taiwan, July 2004.
|