參考文獻 |
[1] W. Zeng, H. Yu, and C.-Y. Lin, Multimedia Security Technologies for Digital
Rights Management. Elsevier, 2006.
[2] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking
and Steganography. Morgan Kaufmann, 2007.
[3] K. J. R. Liu, W. Trappe, Z. J. Wang, M. Wu, and H. Zhao, Multimedia Fingerprinting
Forensics for Traitor Tracing. Hindawi, 2005.
[4] F. Hartung and B. Girod, “Digital watermarking of raw and compressed
video,” Proc. SPIE Digital Compression Technologies and Systems for Video
Communication, pp. 205–213, 1996.
[5] ——, “Watermarking of MPEG-2 encoded video without decoding and reencoding,”
Proceedings Multimedia Computing and Networking (MMCN),
1997.
[6] T. Kalker, G. Depovere, J. Haitsma, and M. J. Maes, “A video watermarking
system for broadcast monitoring,” in Proc. SPIE, Security and Watermarking
of Multimedia Contents, vol. 3657, Apr. 1999, pp. 103–112.
[7] V. Darmstaedter, J.-F. Delaigle, D. Nicholson, and B. Macq, “A block based
watermarking technique for MPEG-2 signals: Optimization and validation on
real digital TV distribution links,” in Proc. European Conference Multimedia Applications, Services and Techniques, Berlin, Germany, May 1998, pp. 190–
206.
[8] J. Dittmann, M. Stabenau, and R. Steinmetz, “Robust MPEG video watermarking
technologies,” in Proc. ACM Multimedia, Bristol, U.K., Sep. 1998,
pp. 71–80.
[9] T.-Y. Chung, M.-S. Hong, Y.-N. Oh, D.-H. Shin, and S.-H. Park, “Digital
watermarking for copyright protection of MPEG-2 compressed video,” IEEE
Transaction on Consumer Electronics, vol. 44, pp. 895–901, 1998.
[10] D. Simitopoulos, S. A. Tsaftaris, N. V. Boulgouris, and M. G. Strintzis,
“Compressed-domain video watermarking of MPEG streams,” in IEEE Int.
Conf. Multimedia and Expo., vol. 1, 2002, pp. 569–572.
[11] G. C. Langelaar and R. L. Lagendijk, “Optimal differential energy watermarking
of DCT encoded images and video,” IEEE Trans. on Image Processing,
vol. 10, no. 1, pp. 148–158, Jan. 2001.
[12] M. Barni, F. Bartolini, and N. Checcacci, “Watermarking of MPEG-4 video
objects,” vol. 7, no. 1, pp. 23–32, 2005.
[13] M.-J. Lee, D.-H. Im, H.-Y. Lee, K.-S. Kim, and H.-K. Lee, “Real-time video
watermarking system on the compressed domain for high-definition video
contents: Practical issues,” Digital Signal Processing, vol. 22, no. 1, pp. 190–
198, 2012.
[14] L. Wang, H. Ling, F. Zou, and Z. Lu, “Real-time compressed-domain video
watermarking resistance to geometric distortions,” IEEE Multimedia, vol. 19,
no. 1, pp. 70–79, 2012.
[15] J. Zhang, A. Ho, G. Qiu, and P. Marziliano, “Robust video watermarking of
H.264/AVC,” vol. 54, pp. 205–209, February 2007.
[16] A. Mansouri, A. Aznaveh, F. Torkamani-Azar, and F. Kurugollu, “A low
complexity video watermarking in H.264 compressed domain,” IEEE Trans.
on Inf. Forensics and Security, vol. 5, pp. 649– 657, Dec. 2010.
[17] M. Noorkami and R. M. Mersereau, “A framework for robust watermarking
of H.264-encoded video with controllable detection performance,” IEEE
Trans. on Inf. Forensics and Security, vol. 2, pp. 14–23, Mar. 2007.
[18] G.-Z. Wu, Y.-J. Wang, and W.-H. Hsu, “Robust watermark embedding/detection
algorithm for H.264 video,” vol. 14, Jan.-Mar. 2005.
[19] P.-C. Su, C.-S. Wu, I.-F. Chen, C.-Y. Wu, and Y.-C. Wu, “A practical design of
digital video watermarking in H.264/AVC for content authentication,” Signal
Processing: Image Communication, vol. 26, no. 8-9, pp. 413–426, 2011.
[20] J. J. K. Ruanaidh and T. Pun, “Rotation, scale and translation invariant digital
image watermarking,” Signal Processing, vol. 66, no. 3, pp. 303–317, May
1998.
[21] M. Manoochehri, H. Pourghassem, and G. Shahgholian, “A novel synthetic
image watermarking algorithm based on discrete wavelet transform
and fourier-mellin transform,” in Communication Software and Networks
(ICCSN), 2011 IEEE 3rd International Conference on, May 2011, pp. 265–
269.
[22] E. Tsougenis, G. Papakostas, D. Koulouriotis, and V. Tourassis, “Towards
adaptivity of image watermarking in polar harmonic transforms domain,” Optics
and Laser Technology, vol. 54, pp. 84 – 97, 2013.
[23] M. Ali and C. Ahn, “An optimized watermarking technique based on selfadaptive
de in dwt-svd transform domain,” Signal Processing, vol. 94, no. 1,
pp. 545–556, 2014.
[24] G. Coatrieux, W. Pan, N. Cuppens-Boulahia, F. Cuppens, and C. Roux, “Reversible
watermarking based on invariant image classification and dynamic
histogram shifting,” IEEE Transactions on Information Forensics and Security,
vol. 8, no. 1, pp. 111–120, 2013.
[25] A. A. Mohammad, “A new digital image watermarking scheme based on
schur decomposition,” Multimedia Tools and Applications, vol. 59, no. 3,
pp. 851–883, 2012.
[26] S. Pereira and T. Pun, “Robust template matching for affine resistant image
watermarks,” IEEE Trans. Image Process, vol. 9, no. 6, pp. 1123–1129, Jun
2000.
[27] M. Kutter, “Watermarking resisting to translation, rotation, and scaling,” in
SPIE The International Society for Optical Engineering, vol. 3528, 1999, pp.
423–431.
[28] P.-C. Su and C.-C. J. Kuo, “Synchronized detection of the block-based watermark
with invisible grid embedding,” in SPIE Photonics West, San Jose,
CA, Jan. 2001, pp. 423–431.
[29] M. Kutter, S. Bhattacharjee, and T. Ebrahimi, “Towards second generation
watermarking schemes,” in IEEE International Confernece on Image Process,
vol. 1, 1999, pp. 320–323.
[30] X. Wang, J. Wu, and P. Niu, “A new digital image watermarking algorithm
resilient to desynchronization attacks,” IEEE Transactions on Information
Forensics and Security, vol. 2, no. 4, pp. 655–663, 2007.
[31] D. Zheng, S. Wang, and J. Zhao, “RST invariant image watermarking al
gorithm with mathematical modeling and analysis of the watermarking processes,”
IEEE Transactions on Image Processing, vol. 18, no. 5, pp. 1055–
1068, 2009.
[32] H. Tian, Y. Zhao, R. Ni, L. Qin, and X. Li, “LDFT-based watermarking resilient
to local desynchronization attacks,” IEEE Transactions on Cybernetics,
vol. 43, no. 6, pp. 2190–2201, Dec 2013.
[33] H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, “Speeded-up robust features,”
Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346–359,
2008.
[34] D. Arthur and S. Vassilvitskii, “K-means++: The advantages of careful seeding,”
in Proceedings of the Eighteenth Annual ACM-SIAM Symposium on
Discrete Algorithms. Philadelphia, PA, USA: Society for Industrial and
Applied Mathematics, 2007, pp. 1027–1035.
[35] J. M. S. Prewitt, “Object enhancement and extraction,” Picture Processing
and Psychopictorics, pp. 75–149, 1970.
[36] S. Montabone and A. Soto, “Human detection using a mobile platform and
novel features derived from a visual saliency mechanism,” Image and Vision
Computing, vol. 28, no. 3, pp. 391 – 402, 2010.
[37] L. Tong, F. Dai, Y. Zhang, and J. Li, “Prediction restricted H.264/AVC video
scrambling for privacy protection,” Electronics letters, vol. 46, no. 1, pp. 47–
49, 2010.
[38] P.-C. Su, Y.-C. Chang, and C.-Y. Wu, “Geometrically resilient digital image
watermarking by using interest point extraction and extended pilot signals,”
IEEE Trans. on Inf. Forensics and Security, vol. 8, no. 12, pp. 1897–1908,
Dec. 2013.
[39] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit digital watermarking
robust against local nonlinear geometrical distortions,” in IEEE International
Conference on Image Processing, Thessaloniki, Greece, 2001, pp.
999–1002.
[40] J. S. Lim, Two-Dimensional Signal and Image Processing. Prentice Hall,
1990.
[41] W. Bender, D. Gruhl, Morimoto, and A. Lu, “Techniques for data hiding,”
IBM Systems Journal, vol. 35, no. 3-4, pp. 313–336, 1996.
[42] K. Suhring, “H.264/AVC Software JM 18.6,” http://iphome.hhi.de/suehring/
tml/, 2014, [Online] Available.
[43] H. Jegou, M. Douze, and C. Schmid, “Hamming embedding and weak geometry
consistency for large scale image search,” in Proceedings of the 10th
European conference on Computer vision, vol. 5302. Marseille, France:
Springer, Oct 2008, pp. 304–317.
[44] B. Institute, “Tears of Steal,” https://mango.blender.org/download/, 2012,
[Online] Available.
[45] Xiph.org, “Video Test Media,” https://media.xiph.org/video/derf/, 2016,
[Online] Available. |