|
[1]Chih-Ming Chen, “A robust image watermarking method based on wavelet transform and human visual system,” Master Thesis of Department of Electronic Engineering, Chung Yuan Christian University, 2001. [2]A.B. Watson, G.Y. Yang, J.A. Solomon and J.V. Villasenor, “Visibility of wavelet quantization noise,” IEEE Trans. on Image Processing, vol. 6, no. 8, pp.1164-1175, Aug. 1997. [3]A.S. Lewis and G. Knowles, “Image compression using the 2-D wavelet transform,” IEEE Trans. on Image Processing, vol. 1, pp.244-250, April 1992. [4]C.S. Lu, S.K. Huang, C.J. Sze and H.Y.M. Liao, “Cocktail watermarking for digital image protection,” IEEE Trans. on Multimedia, vol. 2, pp.209-224, Dec. 2000. [5]C.S. Lu, S.W. Sun, C.Y. Hsu and P.C. Chang, “Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection,” IEEE Trans. on Multimedia, vol. 8, no. 4, pp.668-685, Aug. 2006. [6]C.S. Lu and C.Y. Hsu, “Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication,” ACM Multimedia Systems Journal, vol. 11, no. 2, pp.159-173, Dec. 2005. [7]C.S. Lu and H.Y.M. Liao, “Multipurpose watermarking for image authentication and protection,” IEEE Trans. on Image Processing, vol. 10, no. 10, pp.1579-1592, Oct. 2001. [8]C.W. Tang and H.M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Trans. on Signal Processing, vol. 51, no. 4, pp.950-958, April 2003. [9]C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller and Y.M. Lui, “Rotation, scale and translation resilient watermarking for images,” IEEE Trans. on Image Processing, vol. 10, no. 5, pp.767-782, May 2001. [10]D. Levicky and P. Foris, “Human visual system models in digital image watermarking,” Radio Engineering, vol. 13, no. 4, pp.38-43, Dec. 2004. [11]D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based fusion,” in Proc. 4th IEEE Int. Conf. on Image Processing, pp.544-547, Oct. 1997. [12]D. Kundur and D. Hatzinakos, “Digital watermarking using multi-resolution wavelet decomposition,” in Proc. IEEE Int. Conf. on Acoustics, Speech, Signal Processing, vol. 5, pp.2969-2972, May 1998. [13]D. Zheng, J. Zhao and A. El Saddik, “RST-invariant digital image watermarking based on log-polar mapping and phase correlation,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, no. 8, pp.753-765, Aug. 2003. [14]F. Petitcolas, R.J. Anderson and M.G. Kuhn, “Attacks on copyright marking systems,” in Proc. Int. Workshop on Information Hiding, LNCS 1575, pp.219-239, April 1998. [15]H. Inoue, A. Miyazaki, A. Yamamoto and T. Katsura, “A digital watermark based on the wavelet transform and its robustness on image compression and transformation,” IEICE Trans. Fund. Electron., Commun., Comput. Sci., vol. E82-A, pp.2-10, Jan. 1999. [16]J. O'Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303-317, May 1998. [17]K. Mikolajczyk and C. Schmid, “An affine invariant interest point detector,” Proc. European Conference on Computer Vision (ECCV), LNCS 2350, pp.128-142, 2002. [18]M. Alghoniemy and A.H. Tewfik, “Geometric invariance in image watermarking,” IEEE Trans. on Image Processing, vol. 13, no. 2, pp.145-153, Feb. 2004. [19]M. Barni, F. Bartolini and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Trans. on Image Processing, vol. 10, no. 5, pp.783-791, May 2001. [20]M.D. Swanson, M. Kobayashi and A.H. Tewfik, “Multimedia data embedding and watermarking technologies,” Proc. IEEE, vol. 86, pp.1064-1087, June 1998. [21]M. Kutter, “Watermarking resisting to translation, rotation, and scaling,” Proc. SPIE International Symposium on Voice, Video, and Data Communication, vol. 3528, pp.523-531, Nov. 1998. [22]M. Kutter and S. Winkler, “A vision-based masking model for spread-spectrum image watermarking,” IEEE Trans. on Image Processing, vol. 11, no. 1, pp.16-25, Jan. 2002. [23]P. Bas, J.M. Chassery and B. Macq, “Geometrically invariant watermarking using feature points,” IEEE Trans. on Image Processing, vol. 11, no. 9, pp.1014-1028, Sep. 2002. [24]R.B. Wolfgang, C.I. Podilchuk and E.J. Delp, “Perceptual watermarks for digital images and video,” Proc. IEEE, vol. 87, pp.1108-1126, July 1999. [25]S. Pereira and T. Pun, “Robust template matching for affine resistant image watermarks,” IEEE Trans. on Image Processing, vol. 9, no. 6, pp.1123-1129, June 2000. [26]S. Pereira and T. Pun, “An iterative template matching algorithm using the chirp-Z transform for digital image watermarking,” Pattern Recognition, vol. 33, pp.173-175, Jan. 2000. [27]S.W. Sun, T.T. Lu and P.C. Chang, “Image watermarking synchronization by significant MSB plane matching,” Pacific-Rim Conference on Multimedia (PCM), LNCS 2532, pp.468-476, Dec. 2002. [28]Y. Liu and J. Zhao, “A robust RST invariant image watermarking method based on locally detected features,” IEEE International Workshop on Haptic Audio Visual Environments and Their Applications, pp.133-138, Oct. 2005. [29]S. Craver, et. al., “On the invertibility of invisible watermarking techniques,” Proc. IEEE Int. Conf. Image Processing, vol. 1, pp.540-543, Oct 1997. [30]M. Kutter, S. Voloshynovskiy and A. Herrigel, “Watermark copy attack,” IS&T/SPIE’s 12th Annual Symp., Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, P. W. Wong and E. J. Delp, Eds., SPIE Proc., vol. 3971, San Jose, CA, Jan. 2000.
|