|
[1]C. Kurak and J. McHugh, "A cautionary note on image downgrading," presented at Computer Security Applications Conference, 1992. [2]H. Min-Shiang, C. Chin-Chen, and H. Kuo-Feng, "A watermarking technique based on one-way hash functions," Consumer Electronics, IEEE Transactions on, vol. 45, pp. 286-294, 1999. [3]L. Chun-Shien and H. Y. M. Liao, "Multipurpose watermarking for image authentication and protection," Image Processing, IEEE Transactions on, vol. 10, pp. 1579-1592, 2001. [4]Y. Wang, J. F. Doherty, and R. E. Van Dyck, "A wavelet-based watermarking algorithm for ownership verification of digital images," Image Processing, IEEE Transactions on, vol. 11, pp. 77-88, 2002. [5]V. Solachidis and L. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," Image Processing, IEEE Transactions on, vol. 10, pp. 1741-1753, 2001. [6]K. Xiangui, H. Jiwu, Q. S. Yun, and L. Yan, "A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 13, pp. 776-786, 2003. [7]M. Eyadat, "Factors that affect the performance of the DCT-block based image watermarking algorithms," 2004. [8]R. Safabakhsh, S. Zaboli, and A. Tabibiazar, "Digital watermarking on still images using wavelet transform," 2004. [9]W.-Y. Chen and C.-H. Chen, "A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection," Pattern Recognition, vol. 38, pp. 587-598, 2005. [10]N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain," Signal Processing, vol. 66, pp. 385-403, 1998. [11]J.-C. Liu and S.-Y. Chen, "Fast two-layer image watermarking without referring to the original image and watermark," Image and Vision Computing, vol. 19, pp. 1083-1097, 2001. [12]H.-C. Huang, F.-H. Wang, and J.-S. Pan, "A VQ-based robust multiwatermarking algorithm," IEICE Transactions on Fundamentals of Electronics, vol. E85-A, pp. 1719-1726, 2002 July. [13]J. Minho and K. HyoungDo, "A digital image watermarking scheme based on vector quantization," IEICE Transactions on Information and Systems, vol. E85-D, pp. 1054-1056, 2002 June. [14]L. Zhe-Ming, X. Dian-Guo, and S. Sheng-He, "Multipurpose image watermarking algorithm based on multistage vector quantization," Image Processing, IEEE Transactions on, vol. 14, pp. 822-831, 2005. [15]N. Efford, Digital Image Processing: Addison-Wesley, Reading, MA, 2000. [16]J. Canny, "A computational approach to edge detection," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 8, pp. 679-698, 1986. [17]C.-C. Kang and W.-J. Wang, "A novel edge detection method based on the maximizing objective function," Pattern Recognition, vol. 40, pp. 609-618, 2007. [18]F. Russo and G. Ramponi, "Fuzzy operator for sharpening of noisy images," Electronics Letters, vol. 28, pp. 1715-1717, 1992. [19]T. Law, H. Itoh, and H. Seki, "Image filtering, edge detection, and edge tracing using fuzzy reasoning," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 18, pp. 481-491, 1996. [20]C. G. Looney, "Nonlinear Rule-based Convolution for Refocusing," Real-Time Imaging, vol. 6, pp. 29-37, 2000. [21]L. R. Liang and C. G. Looney, "Competitive fuzzy edge detection," Applied Soft Computing, vol. 3, pp. 123-137, 2003. [22]V. Srinivasan, P. Bhatia, and S. H. Ong, "Edge detection using a neural network," Pattern Recognition, vol. 27, pp. 1653-1662, 1994. [23]H.-S. Wong, T. Caelli, and L. Guan, "A model-based neural network for edge characterization," Pattern Recognition, vol. 33, pp. 427-444, 2000. [24]K. Suzuki, I. Horiba, and N. Sugie, "Neural Edge Detector - A Good Mimic of Conventional One Yet Robuster against Noise," in Lecture Notes In Computer Science, vol. 2085, 2001. [25]C. G. Looney, "Radial basis functional link nets and fuzzy reasoning," Neurocomputing, vol. 48, pp. 489-509, 2002. [26]R. R. Rakesh, P. Chaudhuri, and C. A. Murthy, "Thresholding in edge detection: a statistical approach," Image Processing, IEEE Transactions on, vol. 13, pp. 927-936, 2004. [27]H.-C. Wu and C.-C. Chang, "A novel digital image watermarking scheme based on the vector quantization technique," Computers & Security, vol. 24, pp. 460-471, 2005. [28]A. Savasere, E. Omiecinski, and S. Navathe, "An Efficient Algorithm for Mining Association Rules in Large Databases," presented at Proceedings of the 21th International Conference on Very Large Databases (VLDB), Zurich, Switzerland, 1995. [29]M. J. Zaki, "Scalable algorithms for association mining," Knowledge and Data Engineering, IEEE Transactions on, vol. 12, pp. 372-390, 2000. [30]L. Feng, T. Dillon, and J. Liu, "Inter-transactional association rules for multi-dimensional contexts for prediction and their application to studying meteorological data," Data & Knowledge Engineering, vol. 37, pp. 85-115, 2001. [31]G. Chen, Q. Wei, D. Liu, and G. Wets, "Simple association rules (SAR) and the SAR-based rule discovery," Computers & Industrial Engineering, vol. 43, pp. 721-733, 2002. [32]Y. Linde, A. Buzo, and R. Gray, "An Algorithm for Vector Quantizer Design," Communications, IEEE Transactions on, vol. 28, pp. 84-95, 1980. [33]H. Hsiang-Cheh, W. Feng-Hsing, and P. Jeng-Shyang, "Efficient and robust watermarking algorithm with vector quantisation," Electronics Letters, vol. 37, pp. 826-828, 2001. [34]C.-C. Chang, F.-C. Shine, and T.-S. Chen, "Pattern-based Side Match Vector Quantization for Image Compression," Imaging Science Journal, vol. 48, pp. 63-76, 2000.
|