|
[1] G. Braudaway, K. A. Magerlein, and F. Mintzer. Protecting publicly available images with a visible image watermark. In Proceedings of the SPIE, International Conference on Electronic Imaging, 1996. [2] B. Chen and G.W.Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 47(4):1423–1443, May 2001. [3] S. C. Chuang, C. H. Huang, and J. L. Wu. Unseen visible watermarking. In Proceedings of IEEE International Conference on Image Processing, 2007. [4] J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673–1687, 1997. [5] J. Cox, M. L. Miller, and J. A. Bloom. Digital Watermarking. Morgan Kaufmann, 2002. [6] Data Matrix. http://www.acuitycimatrix.com/index.html. [7] R. C. Gonzalez and R. E. Woods. Digital image processing. Prentice Hall; 2nd edition, 2002. [8] L. Hakola and H. Linna. Detection of printed codes with a camera phone. In IARIGAI, 2005. [9] C. H. Huang, S. C. Chuang, and J. L. Wu. Digital invisible ink and its applications in steganography. In ACM Multimedia and Security Workshop, 2006. [10] C. H. Huang and J. L. Wu. Attacking visible watermarking schemes. IEEE Transactions on Multimedia, 6(1):16–30, Feb 2004. [11] M. E. Jernigan and F.D’Astous. Entropy-based texture analysis in the spatial frequency domain. IEEE Transactions on Pattern Analysis and Machine Intelligence, 6(2):237–243, 1984. [12] K. Kamijo, N. Kamijo, and M. Sakamoto. Electronic clipping system with invisible barcodes. In Proceedings of the 14th annualACMinternational conference on Multimedia, pages 753–762. ACM Press New York, NY, USA, 2006. [13] M. Kankanhalli, Rajmohan, and J. R. Ramakrishnan. Adaptive visible watermarking of images. In Proceedings of IEEE International Conference on Multimedia Computing and Systems, 1999. [14] H. Linna. Disposable and multipurpose indicators and codes for communicative packaging. In PIRA Smart and Intelligent Packaging Europe Conference, 2004. [15] C. S. Lu. Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Idea Group Publishing, 2005. [16] H. S. Marvar and A. F. Florencio. Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51(4):898–905, 2003. [17] J. Meng and S. F. Chang. Embedding visible watermarks in the compressed domain. In Proceedings of IEEE International Conference on Image Processing, 1998. [18] S. P. Mohanty, J. R. Ramakrishnan, and M. S. Kankanhalli. A dct domain visible watermarking technique for images. In Proceedings of IEEE International Conference on Multimedia and Expo, 2000. [19] QR code. http://www.qrcode.com/. [20] M. D. Swanson, B. Zhu, and A. H. Tewfik. Data hiding for video-in-video. In Proceedings of IEEE International Conference on Image Processing, 1997. [21] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers, and J. K. Su. Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Communication Magazine, Aug 2001. [22] M.Wu and B. Liu. Multimedia data hiding. Springer, 2003.
|