|
[1] Digimarc Co., PictureMarc, http://www.digimarc.com. [2] ISO/IEC 18004:2000. Information technology – Automatic identification and data capture techniques – Bar code symbology – QR Code, 2000. [3] MediaGrid Co., Leadia Pix, http://www.mediagrid.co.jp/. [4] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997. [5] C. S. Lu, S. K. Huang, C. J. Sze, and H. Y. M. Liao, “Cocktail watermarking for digital image protection,” IEEE Transactions on Multimedia, vol. 2, no. 4, pp. 209-224, Dec. 2000. [6] H. S. Malvar and D. A. F. Florêncio, “Improved spread spectrum: a new modulation technique for robust watermarking,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 898-905, Apr. 2003. [7] B. Chen and G. W. Wornell, “Quantization index modulation: a class of provably good methods for digital watermarking and information embedding,” IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423-1443, May 2001. [8] J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, “Scalar costa scheme for information embedding,” IEEE Transactions on Image Processing, vol. 51, no. 4, pp. 1003-1019, Apr. 2003. [9] F. Hartung and F. Ramme, “Digital rights management and watermarking of multimedia content for M-commerce applications,” IEEE Communications Magazine, vol. 38, no. 11, pp. 78-84, Nov. 2000. [10] N. Checcacci, M. Barni, F. Bartolini, and S. Basagni, “Robust video watermarking for wireless multimedia communications,” in Proceedings of IEEE Wireless Communications and Networking Conference, vol. 3, pp. 1530-1535, 2000. [11] B. Graubard, R. Chandramouli, and C. Richmond, “A multiple description framework for oblivious watermarking,” in Proceeding of SPIE: Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 585-593, 2001. [12] Y. Wang, M. T. Orchard, V. A. Vaishampayan, and A. R. Reibman, “Multiple description coding using pairwise correlating transforms,” IEEE Transactions on Image Processing, vol. 10, no. 3, pp. 351-366, Mar. 2001. [13] V. K. Goyal, “Multiple description coding: compression meets the network,” IEEE Signal Processing Magazine, vol. 18, no. 5, pp. 74-93, Sep. 2001. [14] Y. Wang, A. R. Reibman, and S. Lin, “Multiple description coding for video delivery,” Proceedings of the IEEE, vol. 93, no. 1, pp. 57-70, Jan. 2005. [15] S. D. Servetto, K. Ramchandran, V. A. Vaishampayan, and K. Nahrstedt, “Multiple description wavelet based image coding,” IEEE Transactions on Image Processing, vol. 9, no. 5, pp. 813-826, May 2000. [16] V. A. Vaishampayan, “Design of multiple description scalar quantizers,” IEEE Transactions on Information Theory, vol. 39, no. 3, pp. 821-834, May 1993. [17] Y. Wang, S. Wenger, J. Wen, and A. K. Katsaggelos, “Error resilient video coding techniques,” IEEE Signal Processing Magazine, vol. 17, no. 4, pp. 61-82, Jul. 2000. [18] M. Kutter and F. A. P. Petitcolas, “Fair evaluation methods for image watermarking systems,” Journal of Electronic Imaging, vol. 9, no. 4, pp. 445-455, Oct. 2000. [19] F. P. González, C. Mosquera, M. Barni, and A. Abrardo, “Rational dither modulation: a high-rate data-hiding method robust to gain attacks,” IEEE Transactions on Signal Processing, vol. 53, no. 10, pp. 3960-3975, Oct. 2005. [20] P. Bas, “A quantization watermarking technique robust to linear and non-linear valumetric distortion using a fractal set of floating quantizers,” in Proceedings of Information Hiding Workshop, vol. 3727, pp. 106-117, 2005. [21] M. L. Miller, G. J. Doerr, and I. J. Cox, “Applying informed coding and informed embedding to design a robust, high capacity watermark,” IEEE Transactions on Image Processing, vol. 13, no. 6, pp. 792–807, Jun. 2004. [22] A. Abrardo and M. Barni, “Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding,” IEEE Transactions on Signal Processing, vol. 53, no. 2, pp. 824–833, Feb. 2005. [23] J. Oostveen, T. Kalker, and M. Staring, “Adaptive quantization watermarking,” in Proceedings of SPIE: Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 296-303, 2004. [24] K. Sayood, “Introduction to data compression,” Morgan Kaufmann Publishers., 1996. [25] D. J. Newman, “The hexagon theorem,” IEEE Transactions on Information Theory, vol. 28, no. 4, pp. 137-139, Mar. 1982. [26] K. Sayood and S. J. Blankenau, “A fast quantization algorithm for lattice quantizer design,” ICASSP, vol. 2, pp. 1168-1171, 1988. [27] J. H. Conway and N. J. A. Sloane, “Fast quantizing and decoding algorithms for lattice quantizers and codes,” IEEE Transactions on Information Theory, vol. 28, no. 2, pp. 227-232, Mar. 1982. [28] E. Agrell, T. Eriksson, A. Vardy, and K. Zeger, “Closest point search in lattices,” IEEE Transactions on information Theory, vol. 48, no. 8, pp. 2201-2214, Aug. 2002. [29] R. Zamir, S. Shamai, and U. Erez, “Nested linear/lattice codes for structured multiterminal binning,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1250-1276, Jun. 2002. [30] I. J. Cox, M. L. Miller, and J. A. Bloom, “Watermarking: principles & practice,” The Morgan Kaufmann Series in Multimedia and Information Systems, 2001. [31] V. Licks and R. Jordan, “Geometric attacks on image watermarking systems,” IEEE Transactions on Multimedia, vol. 12, no. 3, pp. 68-78, Jul.-Sep. 2005. [32] P. Dong, J. Brankov, N. Galatsanos, Y. Yang, and F. Davoine, “Digital watermarking robust to geometric distortion,” IEEE Transactions on Image Processing, vol. 14, no. 12, pp. 2140-2150, Dec. 2005. [33] M. Kutter, “Watermarking resistance to translation, rotation, and scaling,” Proc. SPIE Multimedia Systems Applications, vol. 3528, pp. 423-432, 1998. [34] S. Pereira and T. Pun, “Robust template matching for affine resistant image watermarks,” IEEE Transactions on Image Processing, vol. 9, no. 6, pp. 1123-1129, Jun. 2000. [35] D. Delannay and B. Macq, “Watermarking relying on cover signal content to hide synchronization marks,” IEEE Trans. on Information Forensics and Security, vol. 1, no. 1, pp. 87-101, Mar. 2006. [36] C.H. Lee and H.K. Lee, “Improved autocorrelation function based watermarking with side information,” Journal of Electronic Imaging, vol. 14, no. 1, pp. 1-13, Jan.-Mar. 2005. [37] F. Deguillaume and S. Voloshynovskiy, T. Pun, “A method for the estimation and recovering of general affine transforms in digital watermarking applications,” In IS&T/SPIE's 14th Annual Symposium, Electronic Imaging, vol. 4675, pp. 313-322, 2002. [38] G.B. Rhoads, Methods for surveying dissemination of proprietary empirical data, U.S. Patent No. 5862260, 1999. [39] P. Bas, J. M. Chassery, and B. Macq, “Geometrically invariant watermarking using feature points,” IEEE Transactions on Image Processing, vol. 11, no. 9, pp. 1014-1028, Sep. 2002. [40] C. W. Tang and H. M. Hang, “A feature based robust digital image watermarking scheme,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 950-959, Apr. 2003. [41] V. Solachidis and I. Pitas, “Circularly symmetric watermark embedding in 2-D DFT Domain,” IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, Nov. 2001. [42] J. J. K. O’Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303-317, May 1998. [43] C. Y. Lin, M. Wu, J. A. Bloom, I.J. Cox, M. L. Miller, and Y. M. Lui, “Rotation, scale, and translation resilient watermarking for images,” IEEE Transactions on Image Processing, vol. 10, no. 5, pp. 767-782, May 2001. [44] A. Herrigel, S. Voloshynovskiy, and Y. Rytsar, “The watermark template attack,” Proc. SPIE Electronic Imaging: Security and Watermarking of Multimedia Content III, vol. 4314, pp. 394-405, 2001. [45] Q. S. Chen, Image registration and its applications in medical imaging, Ph.D. Thesis, Free University Brussels (VUB), 1993. [46] B. S. Reddy and B. N. Chatterji, “An FFT-based technique for translation, rotation, and scale-invariant image registration,” IEEE Transactions on Image Processing, vol. 5, no. 8, pp. 1266-1271, Aug. 1996. [47] R. C. Gonzalez and R. E. Woods, Digital image processing. Upper Saddle River, New Jersey: Prentice-Hall, Inc., 2002. [48] M. Barni, F. Bartolini, V. Cappellini, and A. Piva, “A DCT-domain system for robust image watermarking,” Signal Processing, vol. 66, no. 3, pp. 357-372, May 1998. [49] T. S. Liang and J. J. Rodriguez, “Robust watermarking using robust coefficients,” Proc. SPIE Electronic Imaging: Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 326-335, 2000. [50] R. Barnett and D. E. Pearson, “Frequency mode LR attack operator for digitally watermarked images,” IEE Electronic Letters, vol. 34, no. 19, pp. 1837-1839, Sep. 1998. [51] M. L. Day, S. Y. Lee, and I. C. Jou, “DT-CWT domain based self-synchronization watermarking technique,” 17th IPPR Conference on Computer Vision, Graphics and Image Processing, Taiwan, in CD-ROM, 2004. [52] M. L. Day, S. Y. Lee, and I. C. Jou, “Watermark re-synchronization using sinusoidal signals in DT-CWT Domain,” Fifth IEEE Pacific Rim Conference on Multimedia, Tokyo, Japan, Springer LNCS 3333, pp. 394-401, 2004. [53] M. L. Day, S. Y. Lee, and I. C. Jou, “Multiple description watermarking based on quantization index modulus modulation,” to appear in Journal of Information Science and Engineering. [54] P. Heckbert, Fundamentals of texture mapping and Image warping, Master's Thesis, University of California at Berkeley, Computer Science Division, EECS Department, 1989. [55] J. Portilla, V. Strela, M. Wainwright, and E. P. Simoncelli, “Image denoising using scale mixtures of Gaussians in the wavelet domain,” IEEE Trans. on Image Processing, vol. 12, no. 11, pp. 1338-1351, Nov. 2003. [56] H. R. Sheikh, A. C. Bovik, and G. D. Veciana, “An information fidelity criterion for image quality assessment using natural scene statistics,” IEEE Trans. on Image Processing, vol. 14, no. 12, pp. 2117-2128, Dec. 2005. [57] H. R. Sheikh, A. C. Bovik, and L. Cormack, “No-reference quality assessment using natural scene statistics: JPEG2000,” IEEE Trans. on Image Processing, vol. 14, no. 11, pp. 1918-1927, Nov. 2005. [58] H. R. Sheikh and A. C. Bovik, “Image information and visual quality,” IEEE Trans. on Image Processing, vol. 15, no. 2, pp. 430-444, Feb. 2006. [59] Z. Wang, G. Wu, H. R. Sheikh, E. P. Simoncelli, E. H. Yang, and A. C. Bovik, “Quality-aware images,” IEEE Trans. on Image Processing, vol. 15, no. 6, pp. 1680-1689, Jun. 2006. [60] E. Ohbuchi, H. Hanaizumi, and L. A. Hock, “Barcode readers using the camera device in mobile phones,” Proc. International Conference on Cyberworlds, vol. 00, pp. 260-265, 2004. [61] J. Stach, T. Brundage, B. Hannigan, B. Bradley, T. Kirk, and H. Brunk, “On the use of web cameras for watermark detection,” Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 611-620, 2002. [62] T. Nakamura, A. Katayama, M. Yamamuro, and N. Sonehara, “Fast watermark detection scheme for camera-equipped cellular phone,” ACM Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia, vol. 83, pp. 101-108, 2004. [63] M. Rohs, “Real-world interaction with camera-phones,” 2nd International Symposium on Ubiquitous Computing Systems, vol. 11, pp. 39-48, 2004. [64] ISO/IEC 16022 International Symbology Specification – Datamatrix, 2000. [65] http://en.wikipedia.org/wiki/MaxiCode. [66] D. J. Fleet and D. J. Heeger, “Embedding invisible information in color images,” in IEEE Int. Conf. Image Processing, ICIP’97, vol. 1, pp. 532-535, 1997. [67] N. Kingsbury, “Image processing with complex wavelets,” Phil. Trans. Royal Society London. A, vol. 357, pp. 2543-2560, Sep. 1999. [68] J. Magarey and N. Kingsbury, “Motion estimation using a complex-valued wavelet transform,” IEEE Transactions on Signal Processing, vol. 46, no. 4, pp. 1069-1084, Apr. 1998. [69] P. D. Rivaz, Complex wavelet based image analysis and synthesis, Ph.D Thesis, University of Cambridge, Oct., 2000. [70] L. Sendur and I. W. Selesnick, “Bivariate shrinkage functions for wavelet-based denoising exploiting interscale dependency,” IEEE Transactions on Signal Processing, vol. 50, no. 11, pp. 2744-2756, Nov. 2002. [71] P. Loo, Digital watermarking using complex wavelet, Ph.D Thesis, University of Cambridge, March, 2002. [72] C. Herley, “Why watermarking is nonsense,” IEEE Signal Processing Magazine, vol. 19, no. 5, pp. 10-11, Sep. 2002. [73] P. Moulin, “Comment on ‘Why watermarking is nonsense’,” IEEE Signal Processing Magazine, vol. 20, no. 6, pp. 57-59, Nov. 2003. [74] M. L. Day, Y. M. Du, J. C. Chen, and C. N. Chang, “A study on MOD video quality metrics,” to appear in TL Journal, vol. 37, no. 4, Aug. 2007 (in Chinese). [75] “Stream PQoS metric evaluation,” available at http://www.genista.com. [76] S. Winker, Vision models and quality metrics for image processing applications, Ph. D thesis, EPFL, Switzerland, 2000. [77] P. Campisi, M. Carli, G. Giunta, and A. Neri, “Blind quality assessment system for multimedia communications using tracing watermarking,” IEEE Transactions on Signal Processing, vol. 51, no. 4, pp.996-1001, Apr. 2003. [78] M. L. Day, I. C. Jou, and S. Y. Lee, “Video quality metric for real time communication via fragile watermark,” Workshop on Consumer Electronics (WCE), Tainan, Taiwan, R.O.C., in CD-ROM, 2003 (in Chinese).
|