|
[1] J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image processing, vol. 6, no. 12, pp. 1673–1687, Dec. 1997. [2] A. Z. Tirkel, C. F. Osborne, and R. G. Van Schyndel, “Image watermarking–a spread spectrum application,” in Proc. IEEE 4th Int. Symp. Spread Spectrum Techn. Applicat., vol.2, pp. 785–789, Dec. 1997. [3] L. M. Marvel, C. G. Jr. Boncelet. and C. T. Retter, “Spread spectrum image steganography,” IEEE Trans. Image Processing, vol. 8, no. 8, pp. 1075–1083, Aug. 1999. [4] M. Gkizeli, D. A. Pados, and M. J. Medley, “Embedding image watermarks in DC component,” IEEE Trans. Circuits and system for Video Technolgy, vol. 16, no. 2, pp. 391–405, Feb. 2007. [5] J. Irvine and D. Harle, Data Communications and Networks: An Engineering Approach, Wiley, New York, 2002. [6] S. L. Li, K. C. Leung, L. M. Cheng and C. K. Chan, “Data hiding in images by adaptive LSB substitution based on the pixel-value differencing,” Innovative Computing, Informationand Control., vol. 3, 30-01, pp. 58–61, Aug. 2006. [7] R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121–128, Mar. 2002. [8] K. L. Chung, C. H. Shen and L. C. Chang, “A novel SVD- and VQ-based image hiding scheme,” Pattern Recognition Letters, vol. 22, no. 9, pp. 1051–1058, July 2001. [9] M. Jo and H. D. Kim, “A digital image watermarking scheme based on vector quantization,” IEICE Trans. Information and system, vol. E85-D, no. 6, pp.1054–1056, Jun. 2002. [10] W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel, Lossless recovery of an original image containing embedded data, US Patent, 6,278,791, 2001. [11] B. Macq and F. Deweyand, “Trusted headers for medical images,” in Proc. DFG VIII-D II Watermarking Workshop, Erlangen, Germany, Oct. 1999. [12] J. Fridrich, M. Goljan and R. Du, “Invertible authentication,” in Proc. SPIE , Security and Watermarking of Multimedia Contents, San Jose, CA, pp. 197–208, Jan. 2001. [13] Z. Ni, Y.Q. Shi, N. Ansari and W. Su, “Reversible data hiding,” IEEE Trans. Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–362, Mar. 2006. [14] C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall, New Jersey, 1982.
|