|
[1] M. M. Yeung, F. C. Mintzer, G. W. Braudaway and A. R. Rao, “Digital Watermarking for High-quality Imaging,” Multimedia Signal Processing, 1997, IEEE First Workshop on, pp. 357-362, Jun., 1997. [2] Y. Ren, Y. Cheng, J. Wang and L. Fang, "Data Protection Based on Multifunction Digital Watermark in Wireless Sensor Network," 2015 International Carnahan Conference on Security Technology (ICCST), pp. 37-41, Sep., 2015. [3] W.-M. Chen, H.-C. Wang, C.-L. Wu and P.-C. Lee, ”Image Watermarking Processes on Cloud For Physical Object Technology Research,” Annual Conference on Engineering and Information Technology (ACEAIT), Mar. 29, 2014. [4] H.-C. Wang, I.-Y. Chen and W.-M. Chen, "Image Watermark Protection Based on Self-recovery Images and Sparse Approximation," Multimedia Tools and Applications, pp. 1-13, May. 6, 2016. (doi: 10.1007/s11042-016-3588-7) [5] P. Parashar and R. K. Singh, “A Survey: Digital Image Watermarking Techniques,” International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 7, No. 6, pp. 111-124, 2014. [6] A. Bamatraf, R. Ibrahim and M. Salleh, “A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit,” Journal of Computing, Vol. 3, Iss. 4, pp. 1-8, Apr., 2011. [7] D. Arya, “A Survey of Frequency and Wavelet Domain Digital Watermarking Techniques,” International Journal of Scientific & Engineering Research, Vol. 1, Iss. 2, Nov., 2010. [8] C.-T. Hsu and J.-L. Wu, “Hidden Digital Watermarks in Images, ”IEEE Transactions on Image Processing, Vol. 8, pp. 58-68, Jan. 1999. [9] H. Inoue, A. Miyazaki, A. Yamsmoto and T. Katsura, “A Digital Watermark Technique Based on The Wavelet Transform and Its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E82-A, pp. 2-10, Jan. 1999. [10] 陳偉銘, 王浩駿, 吳伯諺, 李秉奕, 尤靜宜, ”Mobile Visual Computing 基於人眼容錯功能的立體浮水印技術研究,” The Fourth National Conference on Web Intelligence and Applications (NCWIA 2014), 台灣澎湖縣, pp. 72, May. 2, 2014. [11] C.-C. Chang and H.-W. Tseng, “VQ-Based Image Watermarking Using Anti-Gray Coding,” Institute of Mathematics and Informatics, Vilnius, Vol. 15, No. 2, pp. 147–160, 2004 [12] X. Zhang and S. Wang, “Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels,” in IEEE Signal Processing Letters, Vol. 14, pp. 727–730, Oct., 2007. [13] P.-L. Lin, C.-K. Hsieh and P.-W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery,” in Pattern Recognition, Vol. 38, no. 12, pp. 2519-2529, 2005. [14] T.-Y. Lee and S.-D. Lin, “Dual Watermark for Image Tamper Detection and Recovery, in Pattern Recognition,” Vol. 14, No. 11, pp. 3497-3506, 2008. [15] H.-C. Wang, W.-M. Chen and P.-Y. Lee, ”Image Detection and Recovery based on Dilation and Chaotic Mixing,” Asian Conference on Engineering and Natural Sciences (ACENS 2015), Feb. 3, 2015. [16] C. Qin, C.-C. Chang and P.-Y. Chen, “Self-embedding Fragile Watermarking with Restoration Capability Based on Adaptive Bit Allocation Mechanism,” Signal Processing, Vol. 92, issue 4, pp. 1137–1150. Apr., 2012. [17] C. Qin, C.-C. Chang and T.-J. Hsu, “Reversible Data Hiding Scheme Based on Exploiting Modification Direction with Two Steganographic Images,” Multimedia Tools and Applications, Vol. 74, No. 15, pp. 5861–5872, 2014. [18] M. Bertalmio, G. Sapiro, V. Caselles and C. Ballester. “Image Inpainting,” in Proc. ACM Conf. Comp. Graphics (SIGGRAPH), pp. 417-424, Jul. 2000. [19] T. K. Shih and R. C. Chang. “Digital Inpainting - Survey and Multilayer Image Inpainting Algorithms,” in ICITA 2005, Vol. 1, Iss. 4-7, pp. 15-24, Jul. 2005. [20] A. Criminisi, P. Perez and K. Toyama, “Region Filling and Object Removal by Exemplar-Based Image Inpainting,” in IEEE Transactions Image Processing, Vol. 13, No. 9, pp. 1200-1212, Sep. 2004. [21] W.-H. Cheng, C.-H. Hsieh, S.-K. Lin, C.-W. Wang and J.-L. Wu. “Robust Algorithm for Exemplar-based Image Inpainting,” in International Conference on Computer Graphics Imaging and Visualization, 2005. [22] Y. Zhang, J. Xiao and M. Shah “Region Completion in A Single Image,” in Eurographics Association 2004 / Short Presentations, 2004. [23] H.-C. Wang, W.-M. Chen and P.-Y. Lee, “Image Tamper Detection and Recovery based on Dilation and Chaotic Mixing,” Computer Science and Information Technology (HRPUB), Vol. 3, No. 4, pp. 127-132, 2015. [24] P. Breen, “Algorithms for Sparse Approximation,“ in Year 4 Project, School of Mathematics, University of Edinburgh, 2009. [25] J. A. Tropp, “Greed Is Good: Algorithmic Results For Sparse Approximation,” in IEEE Transactions on Information Theory, Vol. 50, no. 10, pp. 2231-2242, Oct., 2004. [26] Linde, Y., Buzo, A. and Gray, R.M., “An Algorithm for Vector Quantizer Design,” in IEEE Transactions on Communications, Vol. 28, no. 1, pp. 84-95, Jan., 1980. [27] H.-C. Wang, W.-M. Chen and Y.-H. Hsieh, “Imperceptible Watermark Research Based On Sparse Approximation,” International Journal of Electrical Engineering (IJEE), Vol. 21, no.3, pp. 93-98, Dec., 2014. [28] R. M. Thanki and K. R. Borisagar, "Discrete Wavelet Transform and Compressive Sensing Based Multibiometric Watermarking — A Novel Approach to Embed Watermark into Biometrie," 2014 2nd International Conference on Emerging Technology Trends in Electronics, pp. 1-6, Dec., 2014. [29] B. Liao, J. Lv, "A Novel Watermark Embedding Scheme Using Compressive Sensing in Wavelet Domain", The Open Cybernetics & Systemics Journal, Vol. 9, pp. 1-6, 2015. [30] H.-C. Wang, W.-M. Chen, Y.-P. Lin and W.-C. Shen, “Tumor Detecting In Colonoscopic Narrow-Band Imaging Data,” in Proc. of IEEE International Symposium on Intelligent Signal Processing and Coummunication Systems, pp. 564-568, Nov. 4-7, 2012. [31] L.-W. Kang, C.-W. Lin, C.-T. Lin and Y.-C. Lin, “Self-Learning-based Rain Streak Removal for Image/Video,” in IEEE International Symposium on Circuits and Systems (ISCAS), pp. 1871-1874, May, 2012. [32] J.A. Tropp and A.C. Gilbert, “Signal Recovery From Random Measurements Via Orthogonal Matching Pursuit,” in IEEE Transactions on Information Theory, Vol. 53, no. 12, pp. 4655-4666, Dec., 2007. [33] K. Nagata and F. Nemenzo, "Some Properties of Binary Gray Code," 2015 International Conference on Computer Application Technologies, pp.72-75, Aug., 2015. [34] E. N. Mambou and T. G. Swart, "Encoding and Decoding of Balanced Q-ary Sequences Using A Gray Code Prefix," 2016 IEEE International Symposium on Information Theory (ISIT), pp.380-384, Jul., 2016. [35] W. He, Q. He, J. Yang and J. Li, "A Fast Codebook Generation Algorithm Based on Multiple Split Initialization Method," 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP), pp. 45-49, Jul., 2015. [36] G. Voyatzis and I. Pitas, “Chaotic Mixing of Digital Images and Applications to Watermarking,” in Proc. of the European Conference on Multimedia Applications, Systems and Techniques (ECMAST’96), Vol. II, pp. 687-694, 1996.
|