|
[1]Advisory Panel on White House Tapes (1974), Report on a Technical Investigation Conducted for the U.S. District Court for the District of Columbia. [Online]. Available: http://www.aes.org/aeshc/docs/forensic.audio/watergate. tapes.report.pdf. [2]Wikipedia, Watergate tapes. [Online]. Available: http://en.wikipedia.org/wiki/ Watergate_tapes. [3]Oxford University Press, Oxford English Dictionary. [Online]. Available: http://www.oed.com/. [4]Ingemar J. Cox, Matthew L. Miller and Jeffrey A. Bloom, Digital watermarking and steganography, 2 ed. London: Elsevier, 2008. [5]Wikipedia, Watermark. [Online]. Available: http://en.wikipedia.org/wiki/ Watermark. [6]Min-Jen Tsai, Kuang-Yao Yu and Yi-Zhang Chen, "Joint wavelet and spatial transformation for digital watermarking," IEEE Transactions on Consumer Electronics, vol. 46, pp. 237, 2000. [7]J. Sun and J. Liu, "Data hiding with video independent components," Electronics Letters, vol. 40, pp. 858-859, 2004. [8]Ruizhen Liu and Tieniu Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Transactions on Multimedia, vol. 4, pp. 121-128, 2002. [9]Sang-Kwang Lee and Yo-Sung Ho, "Digital audio watermarking in the cepstrum domain," IEEE Transactions on Consumer Electronics, vol. 46, pp. 744-750, 2000. [10]M. Alghoniemy and A. H. Tewfik, "Geometric Invariance in image watermarking," IEEE Transactions on Image Processing, vol. 13, pp. 145-153, 2004. [11]Dong Ping, J. G. Brankov, N. P. Galatsanos, Yang Yongyi and F. Davoine, "Digital watermarking robust to geometric distortions," IEEE Transactions on Image Processing, vol. 14, pp. 2140-2150, 2005. [12]A. Takahashi, R. Nishimura and Y. Suzuki, "Multiple watermarks for stereo audio signals using phase-modulation techniques," Signal Processing, IEEE Transactions on [see also Acoustics, Speech, and Signal Processing, IEEE Transactions on], vol. 53, pp. 806-815, 2005. [13]O. T.-C. Chen and Wen-Chih Wu, "Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme," IEEE Transactions on Audio, Speech, and Language Processing, vol. 16, pp. 629-638, 2008. [14]D.J. Coumou and G. Sharma, "Insertion, Deletion Codes With Feature-Based Embedding: A New Paradigm for Watermark Synchronization With Applications to Speech Watermarking," IEEE Transactions on Information Forensics and Security, vol. 3, pp. 153-165, 2008. [15]M. D. Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia data-embedding and watermarking technologies," Proceedings of the IEEE, vol. 86, pp. 1064-1087, 1998. [16]G. C. Langelaar, I. Setyawan and R. L. Lagendijk, "Watermarking digital image and video data. A state-of-the-art," IEEE Signal Processing Magazine, vol. 17, pp. 20-46, 2000. [17]C. I. Podilchuk and E. J. Delp, "Digital watermarking: algorithms and applications," IEEE Signal Processing Magazine, vol. 18, pp. 33-46, 2001. [18]P. Moulin and J.A. O''Sullivan, "Information-theoretic analysis of information hiding," IEEE Transactions on Information Theory, vol. 49, pp. 563-593, 2003. [19]P. Moulin and R. Koetter, "Data-Hiding Codes," Proceedings of the IEEE, vol. 93, pp. 2083-2126, 2005. [20]F. Cayre, C. Fontaine and T. Furon, "Watermarking Security: Theory and Practice," IEEE Transactions on Signal Processing, vol. 53, pp. 3976-3987, 2005. [21]Borko Furht and Darko Kirovski, Multimedia watermarking techniques and applications. Boca Raton, FL: Auerbach Publications, 2006. [22]H. S. Malvar and D. A. F. Florencio, "Improved spread spectrum: a new modulation technique for robust watermarking," IEEE Transactions on Signal Processing, vol. 51, pp. 898-905, 2003. [23]I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, pp. 1673-1687, 1997. [24]I.J. Cox, M.L. Miller and A.L. McKellips, "Watermarking as communications with side information," Proceedings of the IEEE, vol. 87, pp. 1127-1141, 1999. [25]J.R. Hernandez and F. Perez-Gonzalez, "Statistical analysis of watermarking schemes for copyright protection of images," Proceedings of the IEEE, vol. 87, pp. 1142-1166, 1999. [26]Qiang Cheng and T. S. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Transactions on Signal Processing, vol. 51, pp. 906-924, 2003. [27]P. Moulin and A. Ivanovic, "The zero-rate spread-spectrum watermarking game," IEEE Transactions on Signal Processing, vol. 51, pp. 1098-1117, 2003. [28]R.B. Wolfgang, C.I. Podilchuk and E.J. Delp, "Perceptual watermarks for digital images and video," Proceedings of the IEEE, vol. 87, pp. 1108-1126, 1999. [29]M. Kutter and S. Winkler, "A vision-based masking model for spread-spectrum image watermarking," IEEE Transactions on Image Processing, vol. 11, pp. 16-25, 2002. [30]Wei Liu, Lina Dong and Wenjun Zeng, "Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 645-654, 2007. [31]P. Bassia, I. Pitas and N. Nikolaidis, "Robust audio watermarking in the time domain," IEEE Transactions on Multimedia, vol. 3, pp. 232-241, 2001. [32]B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47, pp. 1423-1443, 2001. [33]F. Bartolini, M. Barni and A. Piva, "Performance analysis of ST-DM watermarking in presence of nonadditive attacks," IEEE Transactions on Signal Processing, vol. 52, pp. 2965-2974, 2004. [34]F. Perez-Gonzalez, C. Mosquera, M. Barni and A. Abrardo, "Rational dither modulation: a high-rate data-hiding method invariant to gain attacks," IEEE Transactions on Signal Processing, vol. 53, pp. 3960-3975, 2005. [35]Qiao Li and I.J. Cox, "Using Perceptual Models to Improve Fidelity and Provide Resistance to Valumetric Scaling for Quantization Index Modulation Watermarking," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 127-139, 2007. [36]Martin Steinebach and Jana Dittmann, "Watermarking-Based Digital Audio Data Authentication," Eurasip Journal on Applied Signal Processing, vol. 2003, pp. 1001-1015, 2003. [37]Michiel van der Veen, Fons Bruekers, Arno Van Leest and Stephane Cavin, "High Capacity Reversible Watermarking for Audio," in Proceeding of Security and Watermarking of Multimedia Contents, 2003. pp. 1. [38]Ping Wah Wong, "A public key watermark for image verification and authentication," in Proceeding of International Conference on Image Processing, 1998. pp. 455-459 vol.1. [39]Ping Wah Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, pp. 1593-1601, 2001. [40]M. Utku Celik, G. Sharma, E. Saber and A. Murat Tekalp, "Hierarchical watermarking for secure image authentication with localization," IEEE Transactions on Image Processing, vol. 11, pp. 585-595, 2002. [41]A. Nikolaidis and I. Pitas, "Region-based image watermarking," IEEE Transactions on Image Processing, vol. 10, pp. 1726-1740, 2001. [42]Chih-Wei Tang and Hsueh-Ming Hang, "A feature-based robust digital image watermarking scheme," IEEE Transations on Signal Processing, vol. 51, pp. 950-959, 2003. [43]J. Zhong and S. Huang, "An Enhanced Multiplicative Spread Spectrum Watermarking Scheme," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 1491-1506, 2006. [44]P. Comesana and F. Perez-Gonzalez, "The impact of the cropping attack on scalar STDM data hiding," IEEE Signal Processing Letters, vol. 13, pp. 353-356, 2006. [45]L. Prez-Freire, F. Prez-Gonzlez, T. Furon and P. Comesaa, "Security of Lattice-Based Data Hiding Against the Known Message Attack," IEEE Transactions on Information Forensics and Security, vol. 1, pp. 421-439, 2006. [46]E. Izquierdo and V. Guerra, "An ill-posed operator for secure image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 842-852, 2003. [47]Chuhong Fei, D. Kundur and R.H. Kwong, "Analysis and design of secure watermark-based authentication systems," IEEE Transactions on Information Forensics and Security, vol. 1, pp. 43-55, 2006. [48]Chung-Ping Wu and C. C. J. Kuo, "Speech content integrity verification integrated with ITU G.723.1," in Proceeding of IEEE International Conference on Information Technology: Coding and Computing, 2001. pp. 680-684. [49]Chung-Ping Wu and C. C. J. Kuo, "Fragile speech watermarking based on exponential scale quantization for tamper detection," in Proceeding of IEEE International Conference on Acoustics, Speech, and Signal Processing, 2002. pp. 3305-3308. [50]Song Yuan and Sorin A. Huss, "Audio watermarking algorithm for real-time speech integrity and authentication," in Proceeding of the Multimedia and Security Workshop, 2004. pp. 220. [51]Zhe-Ming Lu, Yan Bin and Sheng-He Sun, "Watermarking combined with CELP speech coding for authentication," IEICE Transactions on Information and Systems, vol. 88, pp. 330-334, 2005. [52]Toshiyuki Sakai and Naohisa Komatsu, "Digital watermarking based on process of speech production," in Proceeding of Security, Steganography, and Watermaking of Multimedia Contents, 2004. pp. 127-137. [53]Chia-Hsiung Liu and O. T. C. Chen, "Fragile speech watermarking scheme with recovering speech contents," in Proceeding of IEEE Midwest Symposium onCircuits and Systems, 2004. pp. 165-168. [54]Chia-Hsiung Liu and O. T. C. Chen, "A content-based fragile watermark scheme for speech waveform authentication," in Proceeding of IEEE Midwest Symposium on Circuits and Systems, 2005. pp. 432-435. [55]M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, pp. 432-441, 2000. [56]C. T. Li, "Digital fragile watermarking scheme for authentication of JPEG images," IEE Proceedings on Vision, Image and Signal Processing, vol. 151, pp. 460-466, 2004. [57]G. Yuval, "How to swindle Rabin," Cryptologia, vol. 3, pp. 187-190, 1979. [58]P. S. L. M. Barreto, H. Y. Kim and V. Rijmen, "Toward secure public-key blockwise fragile authentication watermarking," IEE Proceedings on Vision, Image and Signal Processing, vol. 149, pp. 57-62, 2002. [59]I. T. Union, ITU-T Recommendation G.723.1, 1996. [60]R. Rivest, "The md5 message digest algorithm," FRC 1321, 1992. [61]William Stallings, Cryptography and Network Security: Principles and Practice, 1999. [62]A. S. Spanias, "Speech coding: a tutorial review," Proceedings of the IEEE, vol. 82, pp. 1541-1582, 1994. [63]Mordechai T. Abzug, MD5 Homepage (unofficial). [Online]. Available: http://userpages.umbc.edu/~mabzug1/cs/md5/md5.html. [64]I. T. Union, "ITU-T Recommendation P.862," 2001. [65]R.V. Cox and P. Kroon, "Low bit-rate speech coders for multimedia communication," IEEE Communications Magazine, vol. 34, pp. 34-41, 1996. [66]Maneli Noorkami and Russell M. Mersereau, "A Framework for Robust Watermarking of H.264-Encoded Video With Controllable Detection Performance," IEEE Transactions on Information Forensics and Security, vol. 2, pp. 14-23, 2007. [67]M. Noorkami and R. M. Mersereau, "Digital Video Watermarking in P-Frames With Controlled Video Bit-Rate Increase," Information Forensics and Security, IEEE Transactions on, vol. 3, pp. 441-455, 2008. [68]A. Golikeri, P. Nasiopoulos and Z.J. Wang, "An improved scalar quantization-based digital video watermarking scheme for H.264/AVC," in Proceeding of IEEE International Symposium on Circuits and Systems, 2006. pp. 5 pp. [69]Jing Zhang and Anthony T. S. Ho, "Efficient Robust Watermarking of Compressed 2-D Grayscale Patterns for H.264/AVC," in Proceeding of IEEE Workshop on Multimedia Signal Processing, 2005. pp. 1-4. [70]Cong-Van Nguyen, D.B.H. Tay and Guang Deng, "A Fast Watermarking System for H.264/AVC Video," in Proceeding of IEEE Asia Pacific Conference on Circuits and Systems, 2006. pp. 81-84. [71]Yang Hu, Chuntian Zhang and Yuting Su, "Information Hiding Based on Intra Prediction Modes for H.264/AVC," in Proceeding of IEEE International Conference on Multimedia and Expo, 2007. pp. 1231-1234. [72]R. Iqbal, S. Shirmohammadi and Jiying Zhao, "Hard Authentication of H.264 Video Applying MPEG-21 Generic Bitstream Syntax Description (gBSD)," in Proceeding of IEEE International Conference on Multimedia and Expo, 2007. pp. 875-878. [73]S.K. Kapotas, E.E. Varsaki and A.N. Skodras, "Data Hiding in H. 264 Encoded Video Sequences," in Proceeding of IEEE Workshop on Multimedia Signal Processing, 2007. pp. 373-376. [74]T. Wiegand, G.J. Sullivan, G. Bjontegaard and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 560-576, 2003. [75]Karsten Suhring, H.264/AVC Reference Software. [Online]. Available: http://iphome.hhi.de/suehring/tml/download/.
|