|
[1]N. U. Ahmed, T. Natarajan and R. Kamisetty, “Discrete Cosine Transform, IEEE Trans. on Computers, Vol. C-23, No. 1, pp. 90-93, 1974. [2]R. S. Alomari and A. Al-Jaber, “A Fragile Watermarking Algorithm for Content Authentication, International Journal of Computing & Information Sciences, Vol. 2, No. 1, pp. 27-37, 2005. [3]Z. An and H. Liu, “Research on Digital Watermark Technology Based on LSB Algorithm, IEEE Conf. on Computational and Information Sciences, pp. 207-210, 2012. [4]M. Antonin, M. Barlaud and I. Daubechies, “Image Coding Using Wavelet Transform, IEEE Trans. on Image Processing, Vol. 1, No. 2, pp. 205-220, 1992. [5]M. Bahoura and J. Rouat, “Wavelet Speech Enhancement Based on Time–Scale Adaptation, Speech Communication, Vol. 48, No. 12, pp. 1620-1637, 2005. [6]M. Bahoura and J. Rouat, “Wavelet Speech Enhancement Using the Teager Energy Operator, IEEE Signal Processing Letters, Vol. 8, No. 1, pp. 10-12, 2001. [7]S. Benchikh and M. Corinthios, “Efficiency Evaluation of Different Wavelets for Image Compression, IEEE Conf. on Information Science, Signal Processing and their Applications, pp. 1420-1421, 2012. [8]G. Bhatnagar, B. Raman and K. Swaminathan, “DWT-SVD Based Dual Watermark Scheme, IEEE Conf. on Applications of Digital Information and Web Technologies, pp. 526-531, 2008. [9]A. Chammem, M. Mitrea and F. Prȇteux, “DWT-Based Stereoscopic Image Watermarking, Stereoscopic Displays and Applications, Vol. 7863, 786326-1-10, 2011. [10]L. Chang, W. G. Yan and W. D. Wang, “Research on Robust Image Perceptual Hashing Technology Based on Discrete Cosine Transform, Business, Economics, Financial Sciences, and Management, Vol. 143, pp. 799-809, 2012. [11]C. Charistopulos, A. Skodras and T. Ebrahimi, “The JPEG 2000 Still Image Coding System: An Overview, IEEE Trans. Consumer Electronics, Vol. 46, pp. 1103-1127, 2000. [12]W. Y. Chen, “Color Image Steganography Scheme Using Set Partitioning In Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation, Applied Mathematics and Computation, Vol. 185, pp. 432-448, 2007. [13]W. Y. Chen and C. H. Chen, “A Robust Watermarking Scheme Using Phase Shift Keying With the Combination of Amplitude Boost and Low Amplitude Block Selection, Pattern Recognition, Vol. 38, pp. 587-598, 2005. [14]J. H. Chen and C. H. Chen, “A Watermarking Scheme Using Code Division Multiple Access and DWT, International Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 13-16, 2009. [15]W. Y. Chen and C. H. Chen, “Robust Watermarking Scheme for Still Images Using Frequency Shift Keying High-Variance Block Selection, Optical Engineering, Vol. 42(6), pp. 1826-1835, 2003. [16]J. H. Chen, C. H. Chen and W. Y. Chen, “A Steganography Technique Using Adaptive Phase Modulation, The 3rd Intelligent Living Technology Conference, pp. 783-790, 2008. [17]J. H. Chen, C. H. Chen and W. Y. Chen, “A Watermarking Method for Still Images Using Modified Code Division Multiple Access, International Conf. on Intelligent Systems Design and Applications, pp. 352-357, 2008. [18]W. Y. Chen, J. H. Chen and C. C. Liu, “Concealing Color Image Using Discrete Fourier Transform and Phase Modulation Technique, Artificial Intelligence and Application, 2005. [19]W. Y. Chen, J. H. Chen and C. C. Liu, “Steganography Scheme for Color Image Using DWT and Set Partitioning in Hierarchical Trees Coding, Symposium on Application of Information, Management and Communication Technology, pp. 1-7, 2005. [20]W. Y. Chen, J. H. Chen and C. C. Liu, “Watermarking Scheme for Still Image Using Modified Code Division Multiple Access Technique, Conf. on Computer Vision Graphic and Image Processing, pp. 1048-1056, 2005. [21]S. Chen and H. Leung, “Chaotic Watermarking for Video Authentication in Surveillance Applications, IEEE Trans. on Circuits and Systems for Video Technology, Vol. 18, No. 5, pp. 704-709, 2008. [22]G. X. Chen, B. L. Tang, Q. F. Chen and J. L. Tai, “Research into Digital Watermark Algorithm Based on Wavelet Domain, Advanced Engineering Forum, Vol. 6-7, pp. 525-529, 2012. [23]W. Y. Chen and J. W. Wang, “Nested Image Steganography Scheme Using QR-barcode Technique, Optical Engineering, Vol.48(5), pp. 057004-1-10, 2009. [24]Z. Chen, Y. Zhang, C. Sun and W. Yang, “Fusing Discrete Cosine Transform and Multi-level Center-Symmetric Local Binary Pattern Features for Particular Recognition, Intelligent Science and Intelligent Data Engineering, Vol. 7751, pp. 810-816, 2013. [25]M. Y. Cheng and J. C. Chen, “Integrating Barcode and GIS for Monitoring Construction Progress, Automation in Construction, Vol. 11, pp. 23-33, Jan., 2002. [26]H. Chung, W. Y. Chen and C. M. Tu, “Image hidden technique using QR-barcode, IEEE Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 522-525, Sep., 2009. [27]G. Coatrieux, L. Lecornu, C. Roux and B. Sankur, “A Review of Image Watermarking Application in Healthcare, Conf. on Engineering in Medicine and Biology, pp. 4691-4694, 2006. [28]A. Collins, A. Zomorodian, G. Carlsson and L. J. Guibas, “A Barcode Shape Descriptor for Curve Point Cloud Data, Computer and Graphics, Vol. 28, pp. 881-894, 2004. [29]M. U. Çelik, G. Sharma, E. Saber and A. M. Tekalp, “Hierarchal Watermarking for Secure Image Authentication with Localization, IEEE Trans. on Image Processing, Vol. 11, No. 6, pp. 585-595, 2002. [30]I. Daubechies, “The Wavelet Transform, Time-Frequency Localization and Signal Analysis, IEEE Trans. on Information Theory, Vol. 36, pp. 961-1005, 1990. [31]K. Deb, M. D. Al-Seraj, M. M. S. Kowsar and I. H. Strategic, “A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication, IEEE Proceedings International Forum on Strategic Technology, pp. 1-5, 2012. [32]H. Demirel and G. Anbarjafari, “Image Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition, IEEE Trans. on Image Processing, Vol. 20, No. 5, pp. 1458-1460, 2011. [33]H. Deng, L. Chen, J. Zhang and R. Wang, “A 3D Model Watermarking Algorithm Resistant to Affine Transformation, IEEE Conf. on Multimedia Information Networking and Security, pp. 549-551, 2012. [34]S. Dogan, T. Tuncer, E. Avci and A. Gulten, “A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images, Journal of Medical System, Vol. 36, No. 4, pp. 2379-2385, 2012. [35]V. G. Efimov, J. N. Lozhkova and N. Mikhail, “The Program Complex Wavelet Processing of the Results Ultrasonic and Microwave Research of Power Plants, IEEE Conf. Micro/Nanotechnologies and Electron Devices, pp. 90-93, 2012. [36]W. H. Fang, N. C. Hu and S. K. Shih, “Recursive Fast Computation of the Two-Dimensional Discrete Cosine Transform, IEEE Proc. on Vision, Image and Signal Processing, Vol. 146, No. 1, pp. 25-33, 1999. [37]C. Fei, R. H. Kwong and D. Kundur, “A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication, IEEE Trans. on Information Forensics and Security, Vol. 4, No. 2, pp. 179-192, 2009. [38]M. Fierro, H. Ha and Y. Ha, “Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage, IEEE Trans. on Image Processing, Vol. PP, No. 99, pp. 2-15, 2013. [39]D. E. Gilsinn, G. S. Cheok and D. P. O’Leary, “Reconstructing Images of Bar Code for Construction Site Object Recognition, Automation in Construction, Vol. 13, pp. 21-35, 2004. [40]J. H. Guo, “Wavelet Bookmark, Department of Mathematic National Central University. [41]P. Hill, A. Achim and D. Bull, “The Undecimated Dual Tree Complex Wavelet Transform and Its Application to Bivariate Image Denoising Using A Cauchy Model, IEEE Conf. on Image Processing, pp. 1205-1208, 2012. [42]G. Hospodar, I. Verbauwhede and J. G. R. C. Gomes, “Algorithms for Digital Image Steganography Via Statistical Restoration, IEEE Conf. on Symposium on Information Theory and Signal Processing in the Benelux, 2012. [43]S. L. Hsieh, C.P. Yeh and I. J. Tsai, “An Image Copyright Protection Scheme with Tamper Detection Capability, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 342-349, 2009. [44]W. C. Hu, W. H. Chen and C. Y. Yang, “Robust Image Watermarking Based on Discrete Wavelet Transform-Discrete Cosine Transform-Singular Value Decomposition, Journal of Electronic Imaging, Vol. 21, No. 3, pp. 033005-1-7, 2012. [45]H. C. Huang, F. C. Chang and W. C. Fang, “Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications, IEEE Trans. on Consumer Electronics, Vol. 57, No. 2, pp. 779-787, 2011. [46]X. Huang and B. Zhang, “Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks, IEEE Trans. on Information Forensics and Security, Vol. 2, pp. 1-13, 2007. [47]J. In, S. Hsiarani and F. Kossentini, “On RD Optimized Progressive Image Coding Using JPEG, IEEE Trans. on Image Processing, Vol. 8, No. 11, pp. 1630-1638, 1999. [48]V. Jeengar, S. N. Omkar, A. Singh, M. K. Yadav and S. Keshri, “A Review Comparison of Wavelet and Cosine Image Transforms, International Journal of Image, Graphics and Signal Processing, Vol. 4, No. 11, pp. 16-25, 2012. [49]M. V. Joshi, B. Vaibhav and M. S. Raval, “Multilevel Semi-Fragile Watermarking Technique for Improving Biometric Fingerprint System Security, Intelligent Interactive Technologies and Multimedia, Vol. 276, pp. 272-283, 2013. [50]T. W. Kan, C. H. Teng and W. S. Chou, “Applying QR Code in Augmented Reality Applications, Conf. on Virtual Reality Continuum and Application in Industry, pp. 253-257, 2009. [51]X. Kang, R. Yang and J. W. Huang, “Geometric Invariant Audio Watermarking Based on an LCM Feature, IEEE Trans. on Multimedia, Vol. 13, No. 2, pp. 181-190, 2011. [52]K. Khaldi and A. Boudraa, “Audio Watermarking Via EMD, IEEE Trans. on Audio, Speech, and Language, Vol. 21, No. 3, 2013. [53]L. T. Ko, J. E. Chen, Y. S. Shieh and T. Y. Yun, “A Novel Fractional Discrete Cosine Transform Based Reversible Watermarking for Biomedical Image Applications, IEEE Conf. on Computer, Consumer and Control, pp. 36-39, 2012. [54]S. Kornsing and J. Srinonchat, “Exploring Dynamic Time Warping Technique to Wavelet Speech Compression, IEEE Conf. on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 1-4, 2012. [55]D. Kunder and D. Hatzinakos, “Digital Watermarking for Tileable Tamper Proofing and Authentication, Journals & Magazines, Vol. 87, pp. 1167-1180, 1999. [56]N. V. Lalitha, G. Suresh and P. Telagarapu, “Audio Authentication Using Arnold and Discrete Cosine Transform, IEEE Conf. on Computing, Electronics and Electrical Technologies, pp. 530-532, 2012. [57]M. Lang, H. Guo, J. E. Odegard, C. S. Burrus and R.O. Wells, Nonlinear Processing of A Shift Invariant DWT for Noise Reduction, SPIE Conf. on Wavelet Applications, Vol. 2491, pp. 640-651, 1995. [58]T. Y. Lee and S. D. Lin, “Dual Watermark for Image Tamper Detection and Recovery, Pattern Recognition, Vol. 41, pp. 3497-3506, 2008. [59]Y. Lee, J. Nah and J. Kim, “Digital Image Watermarking Using Bidimensional Empirical Mode Decomposition in Wavelet Domain, International Symposium on Multimedia, pp. 583-588, 2009. [60]C. Li, B. Ma, Y. Wang, D. Huang and Z. Zhang, “A Secure Semi-Fragile Self-Recoverable Watermarking Algorithm Using Group-Based Wavelet Quantization, Advances in Multimedia, Vol. 7674, pp. 327-336, 2012. [61]P. L. Lin, C. K. Hsieh and P. W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery, Pattern Recognition, Vol. 38, pp. 2519-2529, 2005. [62]S. D. Lin and Y. H. Huang, “An Integrated Watermarking Technique with Tamper Detection and Recovery, International Journal of Innovative Computer, Information and Control, Vol. 5, No. 11(B), pp. 4309-4316, 2009. [63]S. D. Lin, Y. Kuo and M. Yao, “An Image Watermarking Scheme with Tamper Detection and Recovery, International Journal of Innovative Computer, Information and Control, Vol. 13, No. 6(A), pp. 1379-1387, 2007. [64]S. D. Lin, J. H. Lin and C. Y. Chen, “A ROI-Base Semi-Fragile Watermarking for Image Tamper Detection and Recovery, International Journal of Innovative Computer, Information and Control, Vol. 7, No. 12, pp. 6875-6888, 2011. [65]T. Y. Liu, T. H. Tan and Y. L. Chu, “2D Barcode and Augmented Reality Supported English Learning System, IEEE Conf. on Computer and Information Science, Vol. 6, pp. 5-10, 2007. [66]N. S. Liu, G. H. Yang, D. H. Guo and L. L. Cheng, “A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences, IEEE Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 994-998, 2008. [67]S. Liu, H. Yao and W. Gao, “Steganalysis of Data Hiding Techniques in Wavelet Domain, Conf. on Information Technology: Coding and Computing, pp. 1-4, 2004. [68]K. Maeno, Q. Sun, S. F. Chang and M. Suto, “New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Nonuniform Quantization, IEEE Trans. on Multimedia, Vol. 8, pp. 32-45, 2006. [69]D. Munoz-Mejias, I. Gonzalez-Diaz and F. Diaz-de-Maria, “A Low-Complexity Pre-Processing System for Restoring Low-Quality QR Code Images, IEEE Trans. On Consumer Electronics, Vol. 57, pp. 1320-1328, 2011. [70]N. T. Noore and M. M. Houck, “Embedding Biometric Identifiers in 2D Barcode for Improved Security, Computer and Security, Vol. 23, pp. 679-686, 2004. [71]K. Pal, G. Ghosh and M. Bhattacharya, “A Comparative Study between LSB and Modified Bit Replacement (MBR) Watermarking Technique in Spatial Domain for Biomedical Security, International Journal of Computer Applications Technology Research, Vol. 1, No. 1, pp. 30-39, 2012. [72]S. Palmer, J. Zhang and X. Wang, “New Methods For Objective Evaluation of Fabric Pilling by Frequency Domain Image Processing, Research Journal of Textile and Apparel, Vol. 13, No. 1, pp. 11-23, 2009. [73]B. Patra and J. C. Patra, “CRT-Based Fragile Self-Recovery Watermarking Scheme for Image Authentication and Recovery, IEEE Conf. on Intelligent Signal Processing and Communication System, pp. 430-435, 2012. [74]L. Pesquer, X. Pons, A. Cortés and I. Serral, “Spatial Pattern Alterations from JPEG2000 Lossy Compression of Remote Sensing Images: Massive Variogram Analysis In High Performance Computing, Journal of Applied Remote Sensing, Vol. 7, No. 1, pp. 073595-1-19, 2012. [75]QR-Codes, “Information Technology. Automatic Identification and Data Capture Techniques. QR Code 2005 Bar Code Symbology Specification, ISO/IEC 18004:2006, ISBN 978-0-580-67368-9, Apr., 2007. [76]S. Qiang and Z. Hongbin, “Image Tamper Detection and Recovery Using Dual Watermark, Conf. on Wireless Communications Networking and Mobile Computing, pp. 1-4, 2010. [77]S. Qiao, M. Torkamani-Azar and K. Yoshida, “Stationary Wavelet Transform and Higher Order Statistical Analyses of Intrafascicular Nerve Recordings, Journal of Neural Engineering, Vol. 9, No. 5, pp. 056014-1-11, 2012. [78]A. Rani, B. Raman and S. Kumar, “A Fragile Watermarking Scheme Exploiting Neural Tree for Image Tamper Detection, Conf. on Soft Computing for Problem Solving, Vol. 2, pp. 547-554, 2012. [79]A. Sad and W. A. Pearlman, “A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees, IEEE Trans. on Circuit and Systems for video Technology, Vol. 6, No. 3, pp.243-250, 1996. [80]I. W. Selesnick, R. G. Baraniuk and N. G. Kingsbury, “The Dual-Tree Complex Wavelet Transform, IEEE Trans. on Signal Processing Magazine, Vol. 22, No.6, pp. 123-151, 2005. [81]F. Sepehrband, M. Mortazavi and S. Ghorshi, “An Efficient Lossless Medical Image Transformation Method By Improving Prediction Model, IEEE Conf. on Signal Processing, pp. 728-731, 2010. [82]S. Shanmugasundaram, D. Chidambaram and B. E. Park, “Face Recognition Using Dual Tree Complex Wavelet Transform, Conf. on Informatics and Applications, pp. 58-70, 2012. [83]J. W. Shen, F. Pan and Y. Guo, “Digital Audio Watermark Sharing Based on the Chinese Remainder Theorem, IEEE Conf. on Image and Signal Processing, pp. 572-576, 2012. [84]A. V. Subramanyam, S. Emmanuel and M. S. Kankanhalli, “Robust Watermarking of Compressed and Encrypted JPEG2000 Images, IEEE Trans. on Multimedia, Vol. 14, No. 3, pp. 703-716, 2012. [85]S. C. Tamane and R. R. Deshmukh, “Blind 3D Model Watermarking Based on Multi-Resolution Representation and Fuzzy Logic, International Journal of Computer Science & Information Technology, Vol. 4, No. 1, 2012. [86]C. H. Teng, “Developing QR Code Based Augmented Reality Using SIFT Features, Conf. on This paper appears in: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing, pp. 985-990, 2012. [87]N. Terzija and W. Geisselhardt, “Digital Image Watermarking Using Complex Wavelet Transform, Conf. on Multimedia and Security, pp. 193-198, 2004. [88]C. C. C. Tseng and S. C. Cheng, “Digital Color Image Sharpening Using Fractional Differentiation and Discrete Cosine Transform, IEEE Conf. on Communications and Information Technologies, pp. 181-186, 2012. [89]A. Turlikov, M. Gilmutdinov and A. Veselov, “Detecting Artifacts in Quantization Noise in Images Compresses Using Discrete Cosine Transforms, United States Patent Application, No.US20120236932, 2012. [90]B. Vasic, “Increasing 3D Mesh Watermark Robustness to Affine Transformations Using Barycenter as Spherical Coordinate Origin, ETRAN, TE1.3-1-4, 2012. [91]G. Voyatzis and I. Pitas, “Application of Toral Automorphism in Image Watermarking, IEEE Conf. on Image Processing, Vol. 3, pp. 237-240, 1996. [92]X. Wang and B. Hao, “Applying Blocking and Frame Grouping to Design a Robust Imperceptible Video Watermark, Intelligent Computing Theories and Applications, Vol. 7390, pp. 593-600, 2012. [93]H. J. Wang and C. C. J. Huo, “A Multi-Threshold Wavelet Coder (MTWC) for High Fidelity Image Compression, IEEE Conf. on Image Processing, Vol. 1, pp. 652-655, 1997. [94]Y. Wang and M. Vilermo, “The Modify Discrete Cosine Transform: Its Implication for Audio Coding and Error Concealment, Journal of Audio Engineering Society, Vol. 51, No. 1, pp. 52-61, 2003. [95]C. W. Wu, D. Coppersmith, F. C. Mintzer, C. P. Tresser and M. M. Yeung, “Fragile Imperceptible Digital Watermark with Privacy Control, SPIE Security Watermarking Multimedia Contents, Vol. 3657, pp. 79-84, 1999. [96]Y. Xiang, I. Natgunanathan, D. Peng and W. Zhou, “A Dual-Channel Time-Spread Echo Method for Audio Watermarking, IEEE Trans. on Information Forensics and Security, Vol. 7, No. 2, pp. 383-392, 2012. [97]H. Y. Yang, D. W. Bao, X. Y. Wang and P. P. Niu, “A Robust Content Based Audio Watermarking Using UDWT And Invariant Histogram, Multimedia Tools and Applications, Vol. 57, No. 3, pp. 453-476, 2012. [98]C. Z. Yang, L. F. Liao, X. S. Zheng, Y. L. Zhao and G. Q. Liu, “A New Video Watermark Algorithm Based on Property of the Video, Advanced Materials Research, Vol. 532-533, pp. 1399-1402, 2012. [99]H. Yang and A. C. C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication by Connectivity, IEEE Trans. on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007. [100]G. J. Yu, C. S. Lu and H. Y. M. Liao, “Mean Quantization-Based Fragile Watermarking for Image Authentication, Optical Engineering, Vol. 40(7), pp. 1396-1408, 2001. [101]O. Yun, X. Min, Y. Li and L. Xunting, “Advances in Printing and Packaging Technologies, Applied Mechanics and Materials, Vol. 262, pp. 181-185, 2012. [102]X. Zhang, Z. Qian, Y. Ren and G. Feng, “Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction, IEEE Trans. on Information Forensics and Security, Vol. 6, No. 4, pp. 1223-1232, 2011. [103]T. Zhao, T. Chen, J. Xu, T. Wang and W. Shi, “Multiple Blind Watermark Algorithm Based on Wavelet Packet Transform and Two-dimensional Chaos Scramble, Advanced Materials Research, Vol. 532-533, pp. 1846-1850, 2012. [104]J. M. Zhong, C. H. Leung and Y. Y. Tang, “Wavelet Image Coding Based on Significance Extraction Using Morphological Operation, IEEE Trans. on Image and Signal Processing, Vol. 146, No. 4, pp. 206-210, 1999. [105]A. Zigomitros and C. Patsakis, “Cross Format Embedding of Metadata in Images Using QR Codes, Conf. on Intelligent Interactive Multimedia Systems and Services, pp. 113-121, 2011. [106]D. Zou, Y. Q. Shi, Z. Ni and W. Su, “A Semi-Fragile Lossless Digital Watermarking Scheme Based Integer Wavelet Transform, IEEE Trans. on Circuits and system for Video Technology, Vol. 16, pp. 1294-1300, 2006.
|