參考文獻 |
[1] B.B. Zhu, M.D. Swanson, and A.H. Tewfik, "When seeing isn't believing [multimedia authentication technologies]," IEEE Signal Processing Magazine, vol.21, no.2, pp. 40-49, Mar 2004.
[2] F. Bartolini, A. Tefas, M. Barni, and I. Pitas, "Image authentication techniques for surveillance applications," Proceedings of the IEEE, vol.89, no.10, pp.1403-1418, Oct 2001.
[3] T. Wiegand, G.J. Sullivan, G. Bjntegaard, and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no.7, pp. 560-576, July 2003.
[4] Wallace, K. Gregory, "The JPEG Still Picture Compression Standard," Communications of the ACM, vol. 34, no. 4, pp. 30-44, April 1991.
[5] ISO/IEC, MPEG Standard, http://www.mpeg.org,1998.
[6] ISO/IEC International Standard 13818-2-2:1995.
[7] ISO/IEC International Standard 14496-2:2001.
[8] I. E. G. Richardson, H.264 and MPEG-4 Video Compression Video Coding for Next-generation Multimedia, John Wiley & Sons Ltd, UK, 2003.
[9] JVT, Draft ITU-T Recommendation and Final Draft International Standard, Pattaya, Tailand, 2003.
[10] A. Hallapuro, M. Karczewicz and H. Malvar, “Low Complexity Transform and Quantization-Part I: Basic Implementation,” Joint Video Team of ISO/IEC MPEG & ITU-T VCEG Document, Jan 2002.
[11] W. Diffie, and M.E. Hellman, ”New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no.6, pp.644-654, 1976.
[12] A. Gersho and R. M. Gray, Vector Quantization and Signal Compression, Kluwer Academic Publishers, USA, 1992.
[13] C. S. Lu, Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, Idea Group Publishing, PA, USA, 2005.
[14] Y Linde, A. Buzo, and R.M Gray, ”An algorithm for vector quantizer design,” IEEE Trans. on Communications, vol.28, pp.84-95, 1980.
[15] I. Katsavounidis, C. C. Kuo, and Z. Zhang, "A new initialization technique for generalized Lloyd iteration," IEEE Signal Processing Letters, vol.1, no.10, pp.144-146, Oct 1994.
[16] M. M. Yeung, F. Mintzer, "An invisible watermarking technique for image verification," International Conference on Image Processing, vol.2, pp.680-683, Oct 1997.
[17] J. Fridrich, "Methods for tamper detection in digital images," Proc. Multimedia and Security Workshop at ACM Multimedia, 1999.
[18] J. Fridrich, M. Goljan, A.C. Baldoza, "New fragile authentication watermark for images," International Conference on Image Processing, vol.1, pp.446-449, 2000.
[19] G. Frideman, “The trustworthy digital camera: Restoring credibility to the photographic image,” IEEE Transatctions on Consumer Electronics, vol. 39, pp.905-910, Novemeber 1993.
[20] P.W. Wong,“ A public key watermark for image verification and authentication,” Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp.455-459, October 1998.
[21] P.W. Wong, “A watermark for image integrity and ownership verification,” in Proc. IS&T PIC Conf., May 1998.
[22] M. Wu and B. Liu, “Watermarking for image authentication,” Proceeding of the IEEE International Conference on Image Processing, vol. 2, pp. 437-441, October 1998.
[23] S. Walton, “Information authentication for a slippery new age,” Dr. Dobbs Journal, vol. 20, no.4, pp. 18-26, April 1995.
[24] C. Y. Lin and S. F. Chang, "Semi-Fragile Watermarking for Authenticating JPEG Visual Content," SPIE Security and Watermarking of Multimedia Contents II, Jan. 2000.
[25] C. Y. Lin and S. F. Chang, "Issues and Solutions for Authenticating MPEG Video," SPIE Security and Watermarking of Multimedia Contents, Jan. 1999.
[26] C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Surviving JPEG Lossy Compression," SPIE Storage and Retrieval of Image/Video Database, Jan 1998.
[27] C. Y. Lin and S. F. Chang, "A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation," CU/CTR Technical Report 486-97-19, Dec. 1997.
[28] A. Pramateftakis, T. Oelbaum, and K. Diepold, "Authentication of MPEG-4-based surveillance video," International Conference on Image Processing, vol.1, pp. 33- 37, Oct. 2004
[29] R. Du, and J. Fridrich, "Lossless authentication of MPEG-2 video," Proceeding of IEEE International Conference on Image Processing, vol.2, pp. 893-896, 2002.
[30] C. Y. Lin and S. F. Chang, “SARI: Self-Authentication-and-Recovery Image Watermarking System,” ACM Multimedia , Sept. 2001.
[31] T. Uehara, R. Safavi-Naini, and P. Ogunbona, "An MPEG tolerant authentication system for video data," IEEE International Conference on Multimedia and Expo, vol.2, pp. 891-894, June 2004.
[32] J. Wu, B.B. Zhu, S. Li, and F. Lin, "Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes," IEEE International Conference on Multimedia and Expo, vol.2, pp. 931- 934, June 2004.
[33] M. Holliman, and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol.9, no.3, pp.432-441, Mar 2000.
[34] R. Radhakrishnan, and N. Memon, "On the security of the digest function in the SARI image authentication system," IEEE Transactions on Circuits and Systems for Video Technology, vol.12, no.11, pp. 1030-1033, Nov 2002.
[35] J. Wu, B. B. Zhu, S. Li and F. Lin, “New Attacks on SARI Image Authentication System,” Proc. of SPIE, pp.602-609, 2004.
[36] Y. M. Y. Hasan, and A. M.Hassan, "Fragile blockwise image authentication thwarting vector quantization attack," Proceedings of the Fourth IEEE International Symposium on Signal Processing and Information Technology, vol.1, pp. 530-533, Dec 2004.
[37] M. U. Celik, G. Sharma, E. Saber, and A.M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," Proceedings of IEEE International Conference on Image Processing, vol.2, pp.502-505, Oct 2001.
[38] D. He, Z. Huang, R. Ma, and Q. Sun, "Feature difference analysis in video authentication system," Proceedings of IEEE International Symposium on Circuits and Systems, vol.5, pp. 716-719, May 2004.
[39] A. H. Ouda, and M. R. El-Sakka, "Localization and security enhancement of block-based image authentication," IEEE International Conference on Image Processing, vol.1, pp. 673-679, Sept 2005.
[40] N. Otsu, “A threshold selection method from gray level histogram,” IEEE Trans. on Systems, Man, and Cybernetics, vol.8, pp.62-66, 1978.
[41] R. C. Gonzalez and R. E. Woods, Digital Image Processing, Addison-Wesley, NY, 1992. |