|
參考文獻 [1] I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673-1687, Dec., 1997. [2] Y.X. Yang and X.X. Niu, Theory and Applications of Digital Watermarking, chapter 2, Higher Education Press, Beijing, 2006. [3] S.J. Lee and S.H. Jung, “A Survey of Watermarking Techniques Applied to Multimedia,” Proceedings of IEEE International Symposium on Industrial Electronics, Vol. 1, pp. 272-277, 2001. [4] S. Wu, J. Huang, D. Huang, and Y.Q. Shi, “Efficiently Self-Synchronized Audio Watermarking for Assured Audio Data Transmission,” IEEE Trans. on Broadcasting, Vol. 51, No. 1, pp. 69-76, 2005. [5] B.S. Ko, R. Nishimura, and Y. Suzuki, “Time-Spread Echo Method for Digital Audio Watermarking,” IEEE Trans. on Multimedia, Vol. 7, No. 2, pp. 212-221 April 2005. [6] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusion-Resistant Digital Video Watermarking,” IEEE Trans on Multimedia, Vol. 7, No. 1, pp. 43-51, February 2005. [7] R.G. van Schyndel, A. Z. Trikel, and C. F. Osborne, “A Digital Watermark,” in Proc. of the First IEEE International Conference on Image Processing, Vol. 2, pp. 86-90, Nov. 1994. [8] D.C. Wu and W.H. Tsai, “Spatial-Domain Image Hiding Using Image Differencing,” IEE Proc. Vision Image Signal Process. Vol. 147, No. 1, pp. 29-37, Feb. 2000. [9] J. Fridrich and M. Goljan, “Robust Hash Functions for Digital Watermarking,” IEEE Proc. International Conference on Information Technology: Coding and Computing, Vol., No., pp. 178-183, March 2000. [10] P. Bas, N. Le Bihan, and J.M. Chassery, “Color Image Watermarking Using Quaternion Fourier Transform,” in Proc. of ICASSP, Hong Kong, China, 2003. [11] V. Solachidis and L. Pitas, “Circularly Symmetric Watermark Embedding in 2-D DFT Domain,” IEEE Trans. on Image Processing, Vol. 10, No. 10, pp. 1741-1753, Nov. 2001. [12] J.R. Hernandez, M. Amado, and F. Perez-Gonzalez, “DCT-Domain Watermarking Techniques for Still Image: Detector Performance Analysis and a New Structure,” IEEE Trans. on Image Process, Vol. 9, No. 1, pp. 55-68. Jan. 2000. [13] A. Sverdlov, S. Dexter, and A.M. Eskicioglu, “Robust DCT-SVD Domain Image Watermarking for Copyright Protection: Embedding Data in All Frequencies,” Multimedia Computing and Networking 200 Conference, San Jose, CA, January 16-20, 2005. [14] P. Bao, and Ma Xiaohu. “Image Adaptive Watermarking Using Wavelet Domain Singular Value Decomposition,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 15, No. 1. pp. 96-102. Jan. 2005. [15] M. Barni, F. Bartolini, and A. Piva, “Improved Wavelet-Based Watermarking Through Pixel-Wise Masking,” IEEE Trans. on Image Processing, Vol. 10, No. 5, pp. 783-791, May 2001. [16] R. C. Gonzalez and R. E. Woods, Digital Image Processing. 3rd Edition. Prentice Hall, New York, 2007. [17] N. Otsu, “A Thresholding Selection Method from Gray-Level Histograms,” IEEE Trans. on System Man Cybernetics, Vol. 9, pp.62-69, 1979. [18] R. Rivest, A. Shamir and L. Adleman, “A Method for Obtaining Digital Signatures and Public─Key Cryptosystems,” Communications of the AMC, Vol. 21, No. 2, pp. 120-126, February 1978.
|