參考文獻 |
[1] ISO/IEC 11172-2:1993, “Information technology – Coding of moving pictures and
associated audio for digital storage media at up to about 1.5Mbit/s,” Part 2: Video.
[2] ISO/IEC 13818-2:2000, “Information technology – Generic coding of moving pictures
and associated audio information” :Video.
[3] ISO/IEC 11172-2:1993, “ISO/IEC 14496-2:2004. Information technology – Coding
of audio-visual objects,” Part 2: Visual.
[4] ITU-T (formerly CCITT) Recommendation H.263 Version 2 (H.263+), “Video
Coding for Low Bitrate Communication,” 1998.
[5] “Draft ITU-T recommendation and final draft international standard of joint video
specification (ITU-T Rec. H.264/ISO/IEC 14 496-10 AVC,” in Joint Video Team
(JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050, 2003.
[6] http://iphome.hhi.de/suehring/tml/download/old jm/jm96.zip.
[7] A. Aaron, S. Rane, and B. Girod, “Wyner-Ziv Video Coding with Hash-based Motion
Compensation at the Receiver,” Proc. IEEE Int. Conf. on Image Processing,
2004.
[8] I. Agi and L. Gong, “An empirical study of secure MPEG video transmissions,”
Proc. Internet Society Symp. Network and Distributed System Security, pp. 137-
144, 1996.
[9] A. M. Alattar, E. T. Lin, and M. U. Celik, “Digital Watermarking of Low Bit-Rate
Advanced Simple Profile MPEG-4 Compressed Video,” IEEE Trans. on Circuits
and Systems for Video Technology, Vol. 13, No. 8, pp. 787-800, 2003.
[10] S. Arena, M. Caramma, and R. Lancini, “DigitalWatermarking Applied toMPEG-
2 Coded Video Sequences Exploiting Space and Frequency Masking,” Proc. IEEE
Int. Conf. on Image Processing, 2000.
[11] E. Ayanoglu, R. Pancha, A. R. Reibman, and S. Talwar, “Forward Error Control
forMPEG-2 Video Transport in aWireless ATMLAN,” ACM/BaltzerMobile Networks
and Applications, Vol. 1, No. 3, pp. 245 258, 1996.
[12] S. Baudry and P. Nguyen and H. Maita, “Channel coding in video watermarking:
use of soft decoding to improve the watermark retrieval,” Proc. IEEE Int. Conf. on
Image Processing, 2000.
[13] M. Chen, Y. He, and R. L. Landgelijk, “A Fragile Watermark Error Detection
Scheme for Wireless Video Communications,” IEEE Trans. on Multimedia, Vol.
7, No. 2, pp. 201-211, 2005.
[14] H. Cheng and X. Li, “Partial Encryption of Compressed Images and Videos,” IEEE
Trans. on Signal Processing, vol. 48, pp. 2439-2451, Aug. 2000.
[15] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking
for Multimedia,” IEEE Trans. on Image Processing, Vol. 6, pp. 1673-
1687, 1997.
[16] I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital Watermarking,” Morgan Kaufmann
Publishers, 2002.
[17] J. Dittmann, M. Stabenau, and R. Steinmetz, “Robust MPEG Video Watermarking
Technologies,” Proc. ACM Multimedia, Bristol, UK, 1998.
[18] J. Fridrich, “Visual Hash for Oblivious Watermarking,” Proc. SPIE: Security and
Watermarking of Multimedia Contents II, 2000.
[19] F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed
Video,” Signal Processing, Vol. 66, No. 3, pp. 283-302, 1998.
[20] F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” Proceedings
of the IEEE, Vol. 87, pp. 1079-1107, 1999.
[21] C. Y. Hsu and C. S. Lu, “A Geometric-Resilient Image Hashing System and Its
Application Scalability,” Proc. ACM Multimedia and Security Workshop, pp. 81-
92, Magdeburg, Germany, 2004.
[22] IEEE Int. Conf. on Multimedia and Expo: special session on Media Identification,
June 2004.
[23] T. Kalker, G. Depovere, J. Haitsma, and M. Maes, “A VideoWatermarking System
for Broadcast Monitoring,” Proc. of the SPIE, Vol. 3657, pp. 103-112, 1999.
[24] D. R. Kim and S. H. Park, “A Robust Video Watermarking Method,” Proc. IEEE
Int. Conf. on Multimedia and Expo, 2000.
[25] M. Kutter, S. Voloshynovskiy, and A. Herrigel, “The Watermark Copy Attack”,
Proc. SPIE: Security and Watermarking of Multimedia Contents II, Vol. 3971,
2000.
[26] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-Time Labeling ofMPEG-
2 Compressed Video,” Journal of Visual Communication and Image Representation,
Vol. 9, No. 4, pp. 256-270, 1998.
[27] G. C. Langelaar and R. L. Lagendijk, “Optimal Differential Energy Watermarking
of DCT encoded Images and Videos,” IEEE Trans. on Image Processing, Vol. 10,
No. 1, pp. 148-158, 2001.
[28] M. Lee, S. Nepal, and U. Srinivasan, “Role of Edge Detection in Video Semantics,”
Proc. ACS Conferences in Research and Practice in Information Technology, Vol.
22, pp. 59-68, 2003.
[29] B. Li, E. Chang, and C. T. Wu, “DPF – A Perceptual Distance Function for Image
Retrieval,” Proc. IEEE Int. Conf. on Image Processing, 2002.
[30] C. Y. Lin and S. F. Chang, “A Robust Image AuthenticationMethod Distinguishing
JPEG Compression from Malicious Manipulation,” IEEE Trans. on Circuits and
Systems for Video Tech., Vol. 11, No. 2, pp. 153-168, 2001.
[31] C. Y. Lin, D. Sow, and S. F. Chang, “Using Self-Authentication-and-Recovery Images
for Error Concealment in Wireless Environments,” SPIE ITCom/OptiComm,
Denver, CO, Vol. 4518, 2001.
[32] Y. J. Liang, J. G. Apostolopoulos, and B. Girod, “Analysis of Packet Loss for Compressed
Video: Does Burst-length Matter?” Proc. IEEE Int. Conf. on Acoustics,
Speech, and Signal Processing , 2003.
[33] J. Linnartz and J. C. Talstra, “MPEG PTY-Marks: Cheap Detection of embedded
Copyright Data in DVD-Video,” ESORICS98., 1998.
[34] C. S. Lu, “Wireless Multimedia Error Resilience via A Data Hiding Technique,”
Proc. 5th IEEE Int.Workshop onMultimedia Signal Processing, US Virgin Islands,
USA, 2002.
[35] C. S. Lu and C. Y. Hsu, “Content-dependent Anti-Disclosure Image Watermark”,
Proc. Int. Workshop on Digital Watermarking, LNCS 2939, pp. 61-76, Seoul, Korea,
2003.
[36] C. S. Lu and H. Y. Mark Liao, “Structural Digital Signature for Image Authentication:
An Incidental Distortion Resistant Scheme,” IEEE Trans. on Multimedia,
Vol. 5, No. 2, pp. 161-173, 2003.
[37] C. S. Lu, J. R. Chen, and K. C. Fan, “Resistance of Content-dependent Video
Watermarking to Watermark-Estimation Attacks,” Proc. IEEE Int. Conf. on Communications,
pp. 1386-1390, France, 2004.
[38] C. S. Lu, C. Y. Hsu, S. W. Sun, and P. C. Chang, “Robust Mesh-based Hashing for
Copy Detection and Tracing of Images,” Proc. IEEE Int. Conf. on Multimedia and
Expo, Taipei, Taiwan, 2004.
[39] C. S. Lu, S. W. Sun, and P. C. Chang, “Robust Mesh-based Content-dependent
Image Watermarking with Resistance to Both Geometric Attack and Watermark-
Estimation Attack,” Proc. SPIE: Security, Steganography, and Watermarking of
Multimedia Contents VII (EI120), San Jose, California, USA, 2005.
[40] C. S. Lu and C. Y. Hsu, “Geometric Distortion-Resilient Image Hashing Scheme
and Its Applications on Copy Detection and Authentication,” ACM Multimedia
Systems Journal, special issue on Multimedia and Security, Vol. 11, No. 2, pp.
159-173, December 2005.
[41] IEEE Int. Workshop on Multimedia Signal Processing, special session on Media
Recognition, 2002.
[42] I. Moccagatta, A. Soudagar, J. Liang, and H. Chen, “Error-Resilient Coding in
JPEG-2000 and MPEG-4,” IEEE Journal on Selected Area in Communications,
Vol. 18, No. 6, pp. 899 914, 2000.
[43] ftp://ftp.mpegtv.com/pub/mpeg/mssg/mpeg2v12.zip.
[44] F. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Information Hiding: A Survey,”
Proc. of the IEEE, Vol. 87, pp. 1062-1078, 1999.
[45] W. Pongpadpinit and A. Pearmain, “Recovery of Motion Vectors for Error Concealment
Based on an Edge-Detection Approach,” IEE Proc.-Vis. Image Signal
Process.,, Vol. 153, No. 1, pp. 63-69, Feb. 2006.
[46] R. Puri, K. Ramchandran, K. W. Lee, and V. Bharghavan, “Forward Error Correction
(FEC) Codes BasedMultiple Description Coding for Internet Video Streaming
and Multicast,” Signal Processing: Image Communication, Vol. 16, pp. 745-762,
May 2001.
[47] L. Qiao and K. Nahrstedt, “Comparison ofMPEG encryption algorithms,” Comput.
Graph., Vol. 22, no. 4, pp. 437-448, 1998.
[48] K.C. Roh, K.D. Seoa, and J.K. Kim “Data Partitioning and Coding of DCT Coefficients
Based on Requantization for Error-Resilient Transmission of Video,” Signal
Processing: Image Communication, Vol. 17, pp. 573 585, 2002.
[49] A. Sehgal, A. Jagmohan, and N. Ahuja, “Wyner-Ziv Coding of Video: An Error-
Resilient Compression Framework,” IEEE Trans. on Multimedia, Vol. 6, No. 2,
Apr. 2004.
[50] T. Shanableh and M. Ghanbari, “Loss Concealment Using B-Pictures Motion Information,”
IEEE Trans. on Multimedia, Vol. 5, No. 2, 2003.
[51] C. Shi and B. Bhargava, “A fast MPEG video encryption algorithm,” Proc. ACM
Conf. on Multimedia, pp. 81-88, 1998.
[52] C. Shi, S.Y. Wang, and B. Bhargava, “MPEG video encryption in real-time using
secret key cryptography,” Proc. International Conference on Parallel and Distributed
Processing Techniques and Applications, 1999.
[53] S. Shirani, F. Kossentini, and R. Ward, “A Concealment method for Video Communications
in an Error-Prone Environment”, IEEE Journal on Selected Areas in
Communications, Vol. 18, NO. 6, pp. 1122 1128, June 2000.
[54] J. Song and K. J. R. Liu, “A Data Embedded Video Coding Scheme for Error-Prone
Channels,” IEEE Trans. on Multimedia, Vol. 3, No. 4, 2001.
[55] K. Su, D. Kundur, D. Hatzinakos, “Statistical Invisibility for Collusion-resistant
Digital Video Watermarking,” to appear in IEEE Trans. on Multimedia.
[56] M. D. Swanson, B. Zhu, and A. H. Tewfik, “Multiresolution Scene-based Video
Watermarking Using Perceptual Models,” IEEE Journal on Selected Area in Communications,
Vol. 16, No. 4, pp. 540-550, 1998.
[57] L. L. Tang, “Methods for Encrypting and Decrypting MPEG Video Data Efficiently,”
Proc. ACM Conf. on Multimedia, pp. 219-229, 1996.
[58] A. Tosun and W. C. Feng, “On Error Preserving Encryption Algorithms for Wireless
Video Transmission,” Proc. ACM Conf. on Multimedia, 2001.
[59] S. Tsekeridou and I. Pitas, “MPEG-2 Error Concealment Based on Block-Matching
Principles,” IEEE Trans. on Circuits and System for Video Technology, Vol. 10, No.
4, pp. 646 658, June 2000.
[60] Y. Wang and Q. F. Zhu, “Error Control and Concealment for Video Communication:
A review,” Proc. of the IEEE, Vol. 86, pp. 974 997, 1998.
[61] Y. Wang and S. Lin, “Error-Resilient Video Coding Using Multiple Description
Motion Compensation,” IEEE Trans. on Circuits and Systems for Video Technology,
Vol. 12, No. 6, Jun. 2002.
[62] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image Quality Assessment:
From Error Visibility to Structural Similarity,” IEEE Trans. on Image
Processing, Vol. 13, No. 4, pp. 600-612, 2004.
[63] J. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, “A Format-compliant
Configurable Encryption Framework for Access Control of Video,” IEEE Trans.
on Circuits and Systems for Video Technology, Vol. 12, No. 6, pp. 545-557, 2002.
[64] S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgartner, and T. Pun, “Generalized
Watermarking Attack Based on Watermark Estimation and Perceptual Remodulation”,
SPIE: Security and Watermarking of Multimedia Contents II, Vol.
3971, 2000.
[65] S. Voloshynovskiy, F. Deguillaume, S. Pereira, and T. Pun, “Optimal Adaptive
Diversity Watermarking with Channel State Estimation,” Proc. SPIE: Security and
Watermarking of Multimedia Contents III, Vol. 4314, USA, 2001.
[66] X. Xu, S. Dexter, and A. M. Eskicioglu, “A Hybrid Scheme of Encryption and
Watermarking,” IS&T/SPIE Symposium on Electronic Imaging 2004, Security,
Steganography, and Watermarking of Multimedia Contents VI Conference, San
Jose, CA, January 19-22, 2004.
[67] P. Yin, M. Wu, and B. Liu, “A Robust Error Resilient Approach for MPEG Video
Transmission over Internet,” Proc. SPIE: Visual Communication and Image Processing,
2002.
[68] W. Zeng and S. Lei, “Efficient Frequency Domain Selective Scrambling of Digital
Video,” IEEE Trans. on Multimedia, Vol. 5, No. 1, pp. 118-129, 2003.
[69] W. Zeng, X. Zhuang, and J. Lan, “Network Friendly Media Security: Rationales,
Solutions, and Open Issues,” Proc. IEEE Int. Conf. on Image Processing, 2004.
[70] B. B. Zhu, C. Yuan, Y. Wang and S. Li, “Scalable Protection for MPEG-4 Fine
Granularity Scalability,” IEEE Trans. on Multimedia, Vol. 7, No. 2, pp. 222-233,
2005. |