參考文獻 |
References
[1] M. Steinder, S. Iren, and P. D. Amer, “Progressively Authenticated Image Transmission”, in Proceedings Military Communications Conference, Vol.1, Pages 641-645, 1999
[2] C. S. Lu and H. Y. M. Liao, “Multipurpose Watermarking for Image Authentication and Protection”, IEEE Transactions on Image Processing, Vol.10, Issue.10, Pages 1579 –1592, Oct. 2001.
[3] M. Liehua and G. R Arce, “A Class of Authentication Digital Watermarks for Secure Multimedia Communication”, IEEE Transactions on Image Processing, Vol.10, Issue.11, Pages 1754 –1764, Nov. 2001
[4] P. W. Wong and N. Memon, “Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification”, IEEE Transactions on Image Processing, Vol.10, Issue.10, Pages 1593 -1601, Oct. 2001
[5] R. Z. Wang, C. F. Lin, and J. C. Lin, “Image hiding by optimal LSB substitution and genetic algorithm", Pattern Recognition, Vol. 34, No. 3, Pages 671-683, March 2001
[6] C. Rauber, J. O. Ruanaidh, and T. Pun, “Secure Distribution of Watermarked Images for a Digital Library of Ancient Papers”, In Second ACM Conference on Digital Libraries, Philadelphia, PA, Pages 123-130, July 1997, http://cuiwww.unige.ch/~rauber
[7] F. Mintzer, “Developing digital libraries of cultural content for Internet access”, IEEE Communications Magazine, Vol. 37, Pages 72-78, 1999.
[8] J. Jiang and A. Armstrong, “Data hiding approach for efficient image indexing, Electronics Letters”, IEE, Vol. 38, No. 23, Pages 1424-1425, 2002.
[9] C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, “Reversible and Lossless Data Hiding with Application in Digital Library”, IEEE 38th International Carnahan Conference on Security Technology, New Mexico, U.S.A., Pages 226-232, Oct 11-14, 2004.
[10] J. Brassil, S. Low, N. Maxemchuk, and L. O’Gorman, “Electronic marking and identification techniques to discourage document copying”, IEEE Journal on Selected Areas in Communications, Vol.13, Pages 1495–1504, Oct. 1995
[11] S. H. Low, N. F. Maxemchuk, J. T. Brassil, and L. O’Gorman, “Document marking an identification using both line and word shifting,” Proceedings INFORMCOM, Boston, MA, Pages 853–860, Apr 1995
[12] H. Lu, A. C. Kot, and J. Cheng, “Secure Data Hiding in Binary Document Images for Authentication”, IEEE, 2003
[13] M. Y. Wu and J. H. Lee, “A Novel Data Embedding Method for Binary Facsimile Images”, in Proceeding of International Symposium on Multimedia Information Processing, Chung-Li, Taiwan, R.O.C., Dec. 1998
[14] Y. Y. Chen, H. K. Pan, and Y. C. Tseng, “A Secure Data Hiding Scheme for Binary Images”, in IEEE Symposium on Computers and Communications, 2000
[15] Y. C. Tseng and H. K. Pan, “Secure and Invisible Data Hiding in 2-color Images”, in Proceedings IEEE INFOCOM 2001, Pages 887-896, 2001.
[16] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Reversible Data Hiding”, In Proceedings of International Conference on Image Processing, IEEE, Vol. 2, Pages 157-160, 2002
[17] J. Tian, “High Capacity Reversible Data Embedding and Content Authentication”, IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, Pages 517-520, April 2003
[18] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding – New Paradigm in Digital Watermarking”, Special Issue on Emerging Applications of Multimedia Data Hiding, Vol. 2, Pages 185-196, 2002
[19] J. Fridrich, M. Goljan, and R. Du, “Lossless Data Embedding for all Image Formats”, In Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, Vol. 4675-63, Pages 572-583, 2002
[20] J. Tian, “Wavelet-based reversible watermarking for authentication”, In Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents, Vol. 4675-74, Pages 679-690, 2002
[21] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Histogram for Reversible Watermarking”, In IEEE 4th Workshop on Multimedia Signal Processing, Pages 345-350, 2001
[22] G. Xuan, J. Chen, J. Zhu, Y. Q. Shi, Z. Ni, and W. Su, “Lossless Data Hiding based on Integer Wavelet Transform”, IEEE International Workshop on Multimedia Signal Processing, 2002
[23] M. Awrangjeb and M. S. Kankanhalli, “Lossless Watermarking Considering the Human Visual System”, International Workshop on Digital Watermark 2003, LNCS2939, Pages 581-592, 2003
[24] S. W. Kim, S. Suthaharan, H.K. Lee, and K.R. Rao, “Image watermarking scheme using visual model and BN distribution”, Electronic Letters, IEE, Vol. 35, No. 3, Pages 212-214, February, 1999
[25] Y. S. Kim, O. H. Kwon, and R. H. Park, “Wavelet based watermarking method for digital images using the human visual system”, Electronic Letters, IEE, Vol.35, No. 6, Pages 466-468, March 1999
[26] C. L. Tsai, K. C. Fan, C. D. Chung, and T. C. Chuang, “Reversible Data Hiding and Lossless Reconstruction of Binary Images Using Pair-wise Logical Computation Mechanism”, Pattern Recognition, Vol. 38, Issue 11, Pages 1993-2006, November 2005
[27] C. D. Vleeschouwer, J. F. Delaigle, and B. Macq, “Circular Interpretation of Bijective Transforms in Lossless Watermarking for Media Asset Management”, IEEE Transactions on Multimedia, Vol. 5, No. 1, Pages 97-105, March 2003
[28] D. C. Wu and W. H. Tsai, “Spatial-domain image hiding using image differencing”, IEE Proceedings in Vision, Image, and Signal Processing, Vol. 147, Issue 1, Pages 29-37, Feb. 2000
[29] R. G. Schyndel, A. Z. Tirkel, and C. F. Osborne. “A Digital Watermark”, Proc. International Conference on Image Processing, Vol.2, Pages 86-90, 1994
[30] R. B. Wolfgang and E. J. Delp, “A watermark for digital images”, Proceedings ICIP, Vol.3, Pages 219-223, 1996
[31] A. Z. Tirkel, C. F. Osborne, and T. E. Hall, “Image and watermark registration”, Signal Processing, Vol.66, No.3, Pages 373-383, 1998
[32] N. Nikolaidis and I. Pitas, “Robust image watermarking in the spatial domain”, Signal Processing, Vol.66, No.3, Pages 385-403, 1998
[33] R. B. Wolfgang and E. J. Delp, “A Watermarking Technique for Digital Imagery: Future Studies”, Proceedings International Conference On Image Science, Systems and Technology, Las Vegas, Nevada, Juillet, 1997
[34] A. Tirkel, G. Rankin, R. van Schydel, W. Ho, N. Mee, and C. Osborne, “Electronic Water Mark”, Proceedings DICTA 1993, Pages 666-672, Dec 1993
[35] G. Caronni, “Assuming Ownership Rights for Digital Images”, Proceedings Reliable IT System, VIS 1995, 1995
[36] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “The Data Hiding Technique to Support an Watermarking”, NIKKEI Electronics, Vol. 1, Pages 149-162, 1997
[37] K. Matui, “The Basis of the Digital Watermarking”, Morikata publication stock company, Chapter 3, Pages 91-99, 1998
[38] S. Lee and H. Imai. “A New Method of Selecting Blocks for the Digital Watermark using DCT”, Proceedings SCIS, Pages 28-31, Dec. 1993
[39] T. Nakamura, H. Ogawa, and Y. Takahashi, “A Watermarking Technique for Still Images”, NTT R&D, Vol. 47, No.6, Pages 711-714
[40] H. Inoue, A. MiyazakI, and T. Katsura, “A digital watermark for image signals using a controlled quantization method of the wavelet coefficients”, Proceedings International Technique Conference on Circuits/System Computer and Communication, Vol.1, Pages 113-116, Jul. 1998
[41] O. H. Kwon, Y. S. Kim, and R. H. Park, “Wavelet based watermarking method for digital images using the human visual system”, Proceedings International Symposium on Circuits and Systems, Vol.4, Pages 80-83, 1999
[42] A. G. Bors and I. Pitas, “Image Watermarking Using DCT Domain Constraints”, Proceedings ICICS, Vol.3, Pages 231–234, 1996
[43] W. L. Tang and Y. Aoki, “A DCT-based Coding of Images In Watermarking”, Proceedings ICICS, Vol.1, Pages 510 –512, 1997
[44] E. Koch and J. Zhao, “Towards robust and hidden image copyright labeling”, Proce. Workshop on Nonlinear Signal and Image Processing, Marmaros, Greece, Jun 1995
[45] E. Koch and J. Zhao, “Embedding robust labels into images for copyright protection”, Technical report, FRAUNHOFER Institute for Computer Graphics, Darmstadt, Germany, 1994
[46] T. Leighton I. Cox, J. Killian and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Transactions on Image Processing, Pages 1673 –1687, Dec.1997
[47] O. H. Kwon, Y. S. Kim, and R. H. Park, “Watermarking for still images using the human visual system in the DCT domain”, Proceedings International Symposium on Circuits and Systems, Vol.4, Pages 76-79, 1999
[48] J. Huang and Y. Q. Shi, “Embedding strategy for image watermarking in DCT domain”, Proceedings APCC/OECC 1999 on Communication, Vol.2, Pages 981-984, 1999
[49] C. H. Lee, H. S. Oh, Y. Baek, and H. K. Lee, “Adaptive digital image watermarking using variable size of blocks in frequency domain”, Proceedings TENCON 1999, Vol.1, Pages 702-705, 1999
[50] P. Premaratne and C. C. Ko, “A novel watermark embedding and detection scheme for images in DFT domain”, Proceedings International Conference on Image Processing and Its Applications, Vol.2, Pages 780-783, 1999
[51] V. Solachidis and I. Pitas, “Circularly Symmetric Watermark Embedding”, IEEE Transaction on Image Processing, Vol. 10, No. 11, Nov 2001
[52] S. Kang, and Y. Aoki, “Data Hiding System by Fresnel Transform,” Proc. IEEE TENCON, Vol.1, Pages 625–628, 1999
[53] S. Kang and Y. Aoki, “Digital Image Watermarking by Fresnel Transform and its Robustness”, Proceedings ICIP, Vol.2, Pages 221-225, 1999
[54] S. Kang and Y. Aoki, “Data hiding system by Fresnel transform”, Proceedings of IEEE, Vol.1, Pages 625-628, 1999.
[55] S. Kang and Y. Aoki, “Image data embedding system for watermarking using Fresnel transform”, Proceedings International Conference on Multimedia Computing and Systems, Vol.1, Pages 885-889, 1999
[56] A. E. Jacquin, “Image coding based on a fractal theory of iterated contrastive image transformations”, IEEE Transactions on Image Processing, Jan 1992.
[57] P. Bas, J. M. Chassery, and F. Davoine, “Using the fractal code to watermark images”, Proceedings ICIP, Vol.1, Pages 469-473, 1998
[58] J. L. Dugelay and S. Roche, “Fractal transform based large digital watermark embedding and robust full blind extraction”, Proceedings International Conference on Multimedia Computing and Systems, Vol.2, Pages 1003-1004, 1999
[59] B. Chen and G. W. Wornell, “Digital watermarking and information embedding using dither modulation”, Proceedings IEEE Second Workshop on Multimedia Signal Processing, Pages 273 –278, 1998
[60] M. Wu, E. Tang, and B. Liu, “Data Hiding in Digital Binary Image”, IEEE International Conference on Multimedia and Exposition, New York, Vol. 1, 2000
[61] Q. G. Mei, E. K. Wong, and N. D. Memon, “Data hiding in binary text documents”, Security and Watermarking of Multimedia Contents III, Proceedings of SPIE 2001, San Jose, CA, Vol. 4314, No. 4314, Pages 369-375, 2001
[62] H. Lu, J. Wang, and A. C. Kot, “An objective distortion measure for binary document images based on human visual perception”, Proceedings of 16th International Conference on Pattern Recognition, Vol. 4, Pages 239-42, 2002
[63] C. H. Tzeng, Z. F. Yang and W. H. Tsai, “Adaptive Data Hiding in Palette Images by Color Ordering and Mapping with Security Protection”, IEEE Transactions on Communications, Vol. 52, Issue. 5, Pages 791-800, May 2004
[64] M. H. Lin, Y. C. Hu and C. C. Chang, “Both Color and Gray Scale Secret Images Hiding in a Color Image”, International Journal of Pattern Recognition and Artificial Intelligence, Vol. 16, No. 16, Pages 697-713, 2002
[65] J. Tian, “Reversible Watermarking by Difference Expansion”, Multimedia and Security Workshop at ACM Multimedia, Vol. 5, No. 1, Pages 97-105, Dec 2002
[66] A. A. Kassim and W. S. Lee, “Embedded Color Image Coding Using SPIHT with Partially Linked Spatial Orientation Trees”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 2, Pages 203-206, Feb. 2003 |