|
[1] N.K. Abdulaziz and K.K. Pang, ”Robust Data Hiding for Images,” Proceedings of the International Conference on Communication Technology 2000 (WCC - ICCT 2000), vol. 1 , 2000. [2] P. Barreto, H.Y. Kim and V. Rijmen, ”Toward a Secure Public-Key Blockwise Fragile Authentication Watermarking,” IEE Proceedings of the Vision, Image and Signal Processing, vol. 149, no. 2, pp. 57-62, April 2002. [3] G. Garg, P.K. Sharma and S. Chaudhury, ”Image Based Authentication Using DCT,” Pattern Recognition Letters, vol.22, pp. 725-729. [4] M. Hong, F. Kossentini and M.J.T Smith, “A Family of Efficient and Channel Error Resilient Wavelet / Subband Image Coders,” IEEE Transactions On Circuits and System for Video Technology, vol.9, no.1, pp.95-108, February 1999. [5] M. Holliman and N. Memon, “Counterfeiting Attacks on Oblivious Block-wise Independent Invisible Watermarking Schemes,” IEEE Transactions On Image Processing, vol.3, pp.432-441, March 1997. [6] C. T. Hsu and J. L. Wu, “Hidden Signature in Images,” Proceedings of the International Conference on Image Processing, vol.03, pp.223-226, September 1996. [7] Y. Jang, I. Kim, H.I. Kang, K.I. Kim, and S.S. Han, “Blind Watermarking Algorithm Using Complex Block Selection Method,” IEEE Pacific Rim Conference on Multimedia 2001, pp. 996-1001. [8] M. Kutter, F. A. P. Petitcolas, ”A Fair Benchmark for Image Watermarking System,” Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, vol.3657, pp.240-250, January 1999. [9] T. Liu and Z. D. Qiu, “The Survey of Digital Watermarking-based Image Authentication Techniques,” Signal Processing 2002, vol. 2, pp. 1556-1559, August 2002. [10] J. Lee and C.S. Won, “A Watermarking Sequence Using Parities of Error Control Coding for Image Authentication and Correction,” IEEE Transactions on Consumer Electronics, vol. 46, no. 2, pp. 313-317 , May 2000. [11] C.Y. Lin, M. Wu, J.A. Bloom, I.J. Cox, M.L. Miller and Y.M. Lui, “Rotation , Scale and Translation resilient watermarking for images,“ IEEE Transactions on Image Processing, vol. 10, no.5, May 2001. [12] S. Pereira, S.Voloshynoskiy, and T. Pun, “Optimal Transform Domain Watermark Embedding Via Linear Programming,” Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing 2003, vol. 5, pp. 672-675. [13] M. Schneider and S. F. Chang, “A Robust Content Based Digital Signature for Image Authentication,” Proceedings of the International conference on Image Processing, 1996., vol.03, pp.227-230, September 1996. [14] Q. Sun, S.F. Chang, M. Kurato and M. Suto, “A Quantitative Semi-fragile JPEG2000 Image Authentication System,“ Proceedings of the International Conference on Image Processing 2002, vol. 2, pp. 22-25, September 2002. [15] William Stallings, Cryptography and Network Security, Prentice Hall, New Jersey, 1999. [16] W. W. Peterson and E. J Weldon, Jr. , Error-Correcting Codes, 2nd edition, MIT Press, Cambridge, 1972. [17] S. Suthaharan, S.W. Kim, H.K. Lee, ”Perceptually Tuned Robust Watermarking Scheme for Digital Images,” Pattern Recognition Letters, vol.21, p145-149 [18] F. Y. Shih and S.S.T. Wu, ”Combinational Image Watermarking in the Spatial and Frequency Domains,” Pattern Recognition Letters, vol.36, no.4 , pp.969-975. [19] Y. C. Tseng, Y. Y Chen and H.K. Pan, ”A Source Data Hiding Scheme for Binary Images,” IEEE Transactions on Communication, vol. 50, no.8, August 2002. [20] M. Wu and B. Liu, “Watermarking for Image Authentication,” Proceedings of the ICIP Chicago IL, October 1998. [21] P. W. Wong, ”A Public Key Watermark for Image Verification and Authentication,“ Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 455-459, 1998. [22] P. W. Wong and N. Memom, “Secret and Public Key Image Watermarking schemes for Image Authentication and Ownership verification,” IEEE Transaction on Image Processing, vol. 10, no. 10, October 2001. [23] C.W Wu, “On the Design of Content-Based Multimedia Authentication System,” IEEE Transaction on Multimedia, vol.4, no. 3, September 2002. [24] G.J Yu, C.S Lu, H.Y.M Liao and J.P Sheu, ”Mean Quantization Blind Watermarking for Image Authentication,” Proceedings of the IEEE 2000 International Conference on Image Processing, vol. 2, pp. 706-709. [25] D. Zou, C.W. Wu, G. Xuan, Y.Q. Shi, ”A Content-Based Authentication System with Lossless Data Hiding,” Proceedings of the 2003 International Conference on Multimedia and Expo (2003 ICME '03), vol. 2, pp. 6-9, July 2003. [26] 陳同孝、張真誠、黃國峰, 數位影像處理技術, 松崗電腦圖書資料股份有限公司, 2001. [27] 戴顯權, 陳政一, JPEG2000, 紳藍出版社, 2002. [28] USC-SIPI image database, http://sipi.usc.edu/services/database/Database.html
|