|
[1] A. B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor, “Visibility of wavelet quantization noise,” IEEE Transactions on Image Processing, vol. 6, no. 8, pp. 1164-1175, Aug. 1997. [2] W. K. Pratt, Digital Image Processing, Wiley-Interscience, New York, 1978. [3] P. M. Chen, “A visible watermarking mechanism using a statistic approach,” International Conference on Signal Processing Proceedings, vol. 2, pp. 910-913, Aug. 2000. [4] X. Q. Li and X. Y. Xue, “A novel blind watermarking based on lattice vector quantization,” Canadian Conference on Electrical and Computer Engineering, vol. 3, pp. 1823-1826, May 2004. [5] S. F. Sun, P. L. Qiu, Y. L. Wang and L. F. Yao, “Blind watermarking algorithm based on general Gaussian model,” International Conference on Signal Processing, vol. 3, pp. 2302-2305, Aug. 2004. [6] C. H. Huang, J. L. Wu and D. Y. Chen, “A blind watermarking algorithm with semantic meaningful watermarks,” the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers, vol. 2, pp. 1827-1830, Oct. 2000. [7] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Trans. on Image Processing, vol. 8, no. 1, Jan. 1999. [8] L. Y. Liang and W. Gao, “General schemes for blind watermark,” IEEE International Conference on Robotics, Intelligent Systems and Signal Processing, vol. 2, pp. 1185-1190, Oct. 2003. [9] Y. L. Liu, W. Gao, M. H. Cui and Y. X. Song, “General blind watermark schemes,” International Conference on Web Delivering of Music, pp. 143-149, 2002. [10] Y. Choi and K. Aizawa, “Digital watermarking using inter-block correlation,” International Conf. on Image Processing, vol. 2, pp.216-220, October 1999. [11] Y. Choi and K. Aizawa, “Digital watermarking technique using block correlation of DCT coefficients,” Electronics and Communications in Japan, vol. 85, Issue 9, pp. 23-31, Aug. 2002. [12] Y. L. Wang and A. Pearmain, “Blind image data hiding based on self reference,” Pattern Recognition Letters 25, pp. 1681-1689, Aug. 2004. [13] I. J. Cox, M. L. Miller and A.L. McKellips, “Watermarking as communications with side information,” Proceedings of the IEEE, vol. 87, issue 7, pp. 1127-1141, July 1999. [14] C. S. Lu, H. Y. M. Liao and M. Kutter, “A new watermarking scheme resistant to denoising and copy attacks,” IEEE Fourth Workshop on Multimedia Signal Processing, pp. 505-510, Oct. 2001. [15] C. S. Lu, H. Y. M. Liao and M. Kutter, “Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector,” IEEE Transactions on Image Processing, vol. 11, Issue 3, pp. 280-292, March 2002. [16] L. F. Turner, “Digital data security system,” Patent IPN WO 89/08915, 1989. [17] R. G. van Schyndel, A. Z. Tirkel and C. F. Osborne, “A digital watermark,” in Int. Conf. Image Processing, vol. 2, pp. 86-90, 1994. [18] J. Brassil, S. Low, N. Maxemchuk and L. O'Gorman, “Electronic marking and identification techniques to discourage document copying,” in Proc. Infocom, pp. 1278-1287, 1994. [19] S. S. Bedi and S. Verma, “A design of secure watermarking scheme for images in spatial domain,” Annual India Conference, pp. 1-6, Sept. 2006. [20] I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, Dec. 1997. [21] M. Barrni, F. Bartolini and V. Cappellini, “Copyright protection of digital images by embedded unperceivable marks,” Image and vision computing, vol. 16, pp. 897-906, 1998. [22] W. N. Lie, G. S. Lin, C. L. Wu and T. C. Wang, “Robust image watermarking on the DCT domain,” IEEE international symposium on circuits and systems, vol. 1, pp. 228-231, May 2000. [23] W. Zhu, Z. Xiong and Y. Q. Zhang, “Multiresolution watermarking for images and video,” IEEE Trans. Circuits system video technol., vol. 9, no. 4, pp. 545-550, June 1999. [24] M. Tsai, K. Yuang and Y. Chen, “Joint wavelet and spatial transformation for digital watermarking,” IEEE Trans. on Consumer Electronics, vol. 46, issue 1, pp. 241-245, Feb. 2000. [25] X. G. Xia, C. G. Boncelet and G. R. Arce, “Wavelet transform based watermark for digital images,” Optics Express, vol. 3, issue 12, pp. 497-511, 1998. [26] D. Kundur and D. Hatzinakos, “A robust digital image watermarking method using wavelet-based funsion,” IEEE Int. conf. Image Processing, vol. 1, pp. 544-547, 1997. [27] H. Liu, J. Liu, J. Huang, D. Huang and Y. Q. Shi, “A robust DWT-based blind data hiding algorithm,” IEEE international symposium on circuits and system, vol. 2, pp. 672-675, May 2002. [28] I. R. Ismaeil and R. K. Ward, “Removal of DCT blocking artifacts using DC and AC filtering,” Conference on Communications, Computers and signal Processing, vol. 1, pp. 229-232, Aug. 2003. [29] A. Feuer and E. Weinstein, “Convergence analysis of LMS filters with uncorrelated Gaussian data,” IEEE Trans. Acoust., Speech, Signal Processing, vol. 33, no. 1, pp. 222–229, 1985. [30] B. Widrow, J. Mccool and M. Ball, “The complex LMS algorithm,” Proc. IEEE, vol. 55, pp. 719–720, 1974. [31] T. Aboulnasr and K. Mayyas, “A robust variable step-size LMS-type algorithm: analysis and simulations,” IEEE Trans. Signal Processing, vol. 45, no. 3, pp. 631–639, Mar. 1997. [32] R. H. Kwong and E.W. Johnston, “A variable step size LMS algorithm,” IEEE Trans. Signal Processing, vol. 40, no. 7, pp. 1633–1642, Jul. 1992. [33] 戴顯權,《資料壓縮》,第二版,高雄,紳藍,民國九十一年。
|