參考文獻 |
[1] C. I. Podilchuk and E. J. Delp, “Digital watermarking: algorithms and applications,” IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, July 2001.
[2] F. Hartung and M. Kutter, “Multimedia watermarking techniques,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
[3] T.T. Lu, L.L. Lee and P.C. Chang, “A key-based image watermarking system using subblock composition in DCT domain,” Proc. Multimedia Technology and Applications Conference, pp. 157-163, Irvine, CA, Nov. 2001.
[4] J. Lee and C. S. Won, “Authentication and correction of digital watermarking images,” Electronics Letters, vol. 35, no. 11, pp. 886-887, May 1999.
[5] M. Barni, F. Bartolini, R. Caldelli, V. Cappellini, A. De Rosa, and A. Piva, “Robust frame-based watermarking for digital video,” 12th International Workshop on Database and Expert Systems Applications, pp. 825-829, 2001.
[6] J. Huang and Y. Q. Shi, “Adaptive image watermarking scheme based on visual masking,” Electronics Letters, vol. 34, no. 8, pp. 748-750, April 1998.
[7] Z. H. Wei, P. Qin and Y. Q. Fu, “Perceptual digital watermark of images using Wavelet transform,” IEEE Transactions on Consumer Electronics, vol. 44, no. 4, pp. 1267-1272, Nov. 1998.
[8] C. T. Hsu and J. L. Wu, “DCT-based watermarking for video,” IEEE Transactions on Consumer Electronics, vol. 44, no. 1, pp. 206-216, Feb. 1998.
[9] R. B. Wolfgang, C. I. Podilchuk and E. J. Delp, “Perceptual watermarks for digital images and video,” Proceedings of the IEEE, vol. 87, no. 7, pp. 1108 -1126, July 1999.
[10] I. J. Cox, J. Kilian, F.T. Leighton and T. Shamoon, “Secure spread spectrum watermarking for multimedia,” IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673 -1687, Dec. 1997.
[11] F. Hartung and B. Girod, “Digital watermarking of uncompressed and uncompressed video,” Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
[12] S. G. Miaou and C. M. Chen, “A robust image watermarking technique based on Wavelet transform and human visual systems,” J. of Computers, Vol. 13, No. 1, pp. 21-31, March 2001.
[13] I. J. Cox, M. L. Miller and J.A. Bloom, Digital watermarking, Morgan Kaufmann, 2002.
[14] S. Voloshynovskiy, S. Pereira, T. Pun, J. J. Eggers and J. K. Su, “Attacks on digital watermarks: classification, estimation based attacks, and benchmarks,” IEEE Communications Magazine, vol. 39, no. 8, pp. 118-126, Aug. 2001.
[15] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn, “Attacks on copyright marking systems,” in David Aucsmith (Ed), Information Hiding, Second International Workshop, IH'98, Portland, Oregon, U.S.A., April 15-17, 1998, Proceedings, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 219-239.
[16] Fabien A. P. Petitcolas, “Watermarking schemes evaluation,” IEEE Signal Processing, vol. 17, no. 5, pp. 58–64, Sept. 2000.
[17] Stirmark Benchmark 4.0 is available on “http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/”
[18] S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet and T. Pun, “Second generation benchmarking and application oriented evaluation,” in Information Hiding Workshop III, Pittsburgh, PA, USA, April 2001.
[19] Official Optimark Page: http://poseidon.csd.auth.gr/optimark/
[20] S.W. Sun, T.T. Lu, and P.C. Chang, “Image watermarking synchronization by significant MSB plane matching,” Proc. Third IEEE Pacific Rim Conference on Multimedia 2002, pp. 468-476, Hsin-Chu, Taiwan, Dec. 2002.
[21] S.W. Sun and P.C. Chang, “Video Watermarking Synchronization Based on Profile Statistics,” to appear in IEEE Carnahan 2003, Taipei, Taiwan, Oct. 2003.
[22] E. T. Lin and E. J. Delp, “Temporal Synchronization in Video Watermarking,” Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents IV, vol. 4675, January 20-25, 2002, San Jose, CA.
[23] T. Y. Chung, M. S. Hong, Y. N. Oh, D. H. Shin and S. H. Park, “Digital watermarking for copyright protection of MPEG2 compressed video,” IEEE Transactions on Consumer Electronics, vol. 44, no.3, pp. 895-901, Aug. 1998.
[24] J. Zhang, H. Maitre, J. Li, and L. Zhang, “Embedding watermark in MPEG video sequence,” IEEE Fourth Workshop on Multimedia Signal Processing, pp. 535-540, 2001.
[25] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” Proceedings of XIV Brazilian Symposium on Computer Graphics and Image Processing, pp. 179-182, Oct. 2001.
[26] G. C. Langelaar, R. L. Lagendijk, and J. Biemond, “Real-Time labeling of MPEG-2 compressed video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256-270, 1998.
[27] ISO/IEC TTC1/SC29/WG11 13818-2 Information technology– Generic coding of moving pictures and associated audio information: video, 1995.
[28] C. S. Lu, J. R. Chen, H. Y. Mark Liao and K. C. Fan, “Real-Time MPEG2 Video Watermarking in the VLC Domain,” Proc. 16th IAPR Int. Conf. on Pattern Recognition, Quebec, Canada, Vol. II, August 11-15, 2002.
[29] P.C. Chang and T.H. Lee, “Precise and Fast Error Tracking for Error-Resilient Transmission of H.263 Video,” IEEE Trans. on Circuits and Systems for Video Technology, vol. 10, No. 4, pp. 600-607, June 2000.
[30] T.H. Lee and P.C. Chang, “Error Robust H.263 Video Coding with Video Segment Regulation and Precise Error Tracking,” IEICE Trans. on Communications, vol. E84-B, no. 2, pp.317-324, Feb. 2001. |