|
[1]I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography: Morgan Kaufmann, 2007. [2]H. Yongjian and S. Kwong, "An image fusion based visible watermarking algorithm," in Circuits and Systems, 2003. ISCAS '03. Proceedings of the 2003 International Symposium on, 2003, pp. III-794-III-797 vol.3. [3]S. Riaz, M. Y. Javed, and M. A. Anjum, "Invisible watermarking schemes in spatial and frequency domains," in 2008 4th International Conference on Emerging Technologies, 2008, pp. 211-216. [4]張育榮, "結合類神經網路之跨區塊預測能力與人眼視覺特性改進影像盲浮水印效能," 宜蘭大學電子工程學系學位論文, pp. 1-84, 2015. [5]A. C. Bovik, The essential guide to image processing: Academic Press, 2009. [6]S. D. Lin, S.-C. Shie, and J. Y. Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression," Computer Standards & Interfaces, vol. 32, pp. 54-60, 2010. [7]J. C. Patra, J. E. Phua, and C. Bornand, "A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression," Digital Signal Processing, vol. 20, pp. 1597-1611, 12// 2010. [8]C. Das, S. Panigrahi, V. K. Sharma, and K. K. Mahapatra, "A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation," AEU - International Journal of Electronics and Communications, vol. 68, pp. 244-253, 3// 2014. [9]Y. Wang and A. Pearmain, "Blind image data hiding based on self reference," Pattern Recognition Letters, vol. 25, pp. 1681-1689, 11// 2004. [10]Z. Rui-mei, L. Hua, P. Hua-wei, and H. Bo-Ning, "A watermarking algorithm by modifying AC coefficies in DCT domain," in Information Science and Engineering, 2008. ISISE'08. International Symposium on, 2008, pp. 159-162. [11]L.-Y. Hsu and H.-T. Hu, "Blind image watermarking via exploitation of inter-block prediction and visibility threshold in DCT domain," Journal of Visual Communication and Image Representation, vol. 32, pp. 130-143, 10// 2015. [12]H.-T. Hu, Y.-J. Chang, and S.-H. Chen, "A progressive QIM to cope with SVD-based blind image watermarking in DWT domain," in Signal and Information Processing (ChinaSIP), 2014 IEEE China Summit & International Conference on, 2014, pp. 421-425. [13]X. Kang, J. Huang, Y. Q. Shi, and Y. Lin, "A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression," IEEE transactions on circuits and systems for video technology, vol. 13, pp. 776-786, 2003. [14]P. Tao and A. M. Eskicioglu, "An Adaptive Method for Image Recovery in the DFT Domain," Journal of Multimedia, vol. 1, pp. 36-45, 2006. [15]D.-J. Cho, "Study on method of new digital watermark generation using QR-code," in Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on, 2013, pp. 585-588. [16]A. Sun, Y. Sun, and C. Liu, "The QR-code reorganization in illegible snapshots taken by mobile phones," in Computational Science and its Applications, 2007. ICCSA 2007. International Conference on, 2007, pp. 532-538. [17]S. Vongpradhip, "Use multiplexing to increase information in QR code," in Computer Science & Education (ICCSE), 2013 8th International Conference on, 2013, pp. 361-364. [18]C. Skawattananon and S. Vongpradhip, "An improved method to embed larger image in QR code," in Computer Science and Software Engineering (JCSSE), 2013 10th International Joint Conference on, 2013, pp. 64-69. [19]N. Ahmed, T. Natarajan, and K. R. Rao, "Discrete cosine transform," IEEE transactions on Computers, vol. 100, pp. 90-93, 1974. [20]V. I. Arnol'd and A. Avez, "Ergodic problems of classical mechanics," 1968. [21]B. Chen and G. W. Wornell, "Quantization index modulation methods for digital watermarking and information embedding of multimedia," Journal of VLSI Signal Processing Systems, vol. 27, pp. 7-33, 2001. [22]B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47, pp. 1423-1443, 2001. [23]M. Gao and B. Sun, "Blind watermark algorithm based on QR barcode," in Foundations of Intelligent Systems, ed: Springer, 2011, pp. 457-462. [24]S. Rungraungsilp, M. Ketcham, V. Kosolvijak, and S. Vongpradhip, "Data hiding method for QR code based on watermark by compare DCT with DFT domain," in International Conference on Computer and Communication Technologies (ICCCT'2012), 2012, pp. 144-148. [25]J. Panyavaraporn, P. Horkaew, and W. Wongtrairat, "QR code watermarking algorithm based on wavelet transform," in Communications and Information Technologies (ISCIT), 2013 13th International Symposium on, 2013, pp. 791-796. [26]R.-s. Xie, K.-s. Wu, G.-p. Xu, and M. Ouyang, "Research on anti-counterfeiting quick response 2D barcode techniques based on digital watermark," Journal of Shanghai Jiaotong University (Science), vol. 18, pp. 443-447, 2013. [27]R. Xie, C. Hong, S. Zhu, and D. Tao, "Anti-counterfeiting digital watermarking algorithm for printed QR barcode," Neurocomputing, vol. 167, pp. 625-635, 2015. [28]J. Qin, R. Sun, X. Xiang, H. Li, and H. Huang, "Anti-fake Digital Watermarking Algorithm Based on QR Codes and DWT," IJ Network Security, vol. 18, pp. 1102-1108, 2016. [29]H.-T. Hu and L.-Y. Hsu, "Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics," Multimedia Tools and Applications, vol. 76, pp. 6575-6594, 2017. [30]F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal processing, vol. 66, pp. 283-301, 1998.
|