|
[1] J. Wickramasuriya, M. Datt, S. Mehrotra and N. Venkatasubramanian, “Privacy Protecting Data Collection in Media Spaces,” ACM International Conference on Multimedia, New York, NY, Oct. 2004 [2] W. Zhang, S.-C. Cheung, and M. Chen, “Hiding privacy information in video surveillance system,” in Proceedings of the 12th IEEE International Conference on Image Processing, Genova, Italy, Sept. 2005, pp. 868–871. [3] J. K. Paruchuri and S.-C. Cheung. “Joint optimization of data hiding and video compression,” In To appear in IEEE International Symposium on Circuits and Systems (ISCAS 2008), 2008 [4] Ingemar J. Cox, Matthew L. Miller, and Jeffrey A. Bloom, “Digital watermarking”, Morgan Kaufmann Publishers, 2002 [5] Watson. "DCT Quantization Matrices Optimized for Individual Images," Human Vision, Visual Processing, and Digital Display IV, SPIE-1913:202–216, 1993. [6] Xiaojun and Daniel Lewis. “QIM-BASED HISTOGRAM-PRESERVING AND HIGH CAPACITY STEGANOGRAPHY FOR JPEG IMAGES”, 2008 Citeseer [7] G. Le Guelvouit, S. Pateux, C. Guillemot, “Perceptual watermarking of non-i.i.d. signals based on wide spread spectrum using side information,” in: Proceedings of the International Conference on Image Processing, Vol. 3, Rochester, USA, September 2002, pp. 477–480. [8] Ling-Shih Fang, “Game Theoretic Image Authentication and Recovery with Watermarking from Region of Interest,” 2010
|