參考文獻 |
【1】M. Boliek, C. Christopoulos, and E. Majani, “JPEG2000 Final Committee Draft
SC29WG1 N 1646,” ISO/IEC JTC1/SC29/WG1 N1646R, Apr. 2000.
【2】ISO/IEC, ISO/IEC 15444-1, Information technology-JPEG2000 image coding
system, Apr. 2000.
【3】M. Rabbani and D. S. Cruz, “The JPEG 2000 Still-Image Compression
Standard,”the 2001 International Conference in Image Processing (ICIP),
Thessaloniki, Greece, Oct. 2001.
【4】C. Christopoulos, A. Skodras, and T. Ebrahimi, “The JPEG2000 still image
coding system: an overview,” IEEE Transactions on Consumer Electronics,
Vol. 46, No. 4, pp. 1103-1127, Nov. 2000.
【5】J. Fridrich, “Security of fragile authentication watermarks with localization,”
SPIE Photonic West, San Jose, CA, 2002, pp. 691-700, May 2002.
【6】J. Fridrich and M. Goljan, “Images with Self Capabilities,” Image Processing,
1999, vol.3, pp. 792-796, Oct. 1999.
【7】S. Yafei, Z. Li, G. Wu and X. Lin, “Reconstruction of Missing Blocks In Image
Transmission by Using Self-Embedding,” Intelligent Multimedia, Video and
Speech Processing, 2001, pp. 535-538, May 2001.
【8】F.H. Yeh and Greg C. Lee, “Toral Fragile Watermarking for Image
Authentication with Localization,” International Conference on SIGNAL AND
IMAGE PROCESSING 2004, pp. 444-268, Oct. 2004.
【9】H.H. Yu and P. Yin, “Multimedia data recovery using information hiding,”
Global Telecommunications Conference, 2000. GLOBECOM’00. IEEE, vol.3,
pp, 1344-1348, Oct. 2002.
【10】C. Y. Lin and S.F. Chang, “Semi-Fragile Watermarking for JPEG Visual
Content,” in Proc. SPIE Security Watermarking Multimedia Contents II, San
Jose, CA, 2000.
【11】C. Y. Lin and S.F. Chang, “A Robust Image Authentication Method
Distinguishing JPEG Compression from Malicious Manipulation” IEEE
Transactions on Circuits of Video Technology, Vol. 11, No. 2, Feb. 2001
【12】P. Meerwald, “Quantization watermarking in the JPEG2000 coding pipeline,”
Communications and Multimedia Security Issues of The New Century, IFIP
TC6/TC11 Fifth Joint Working Conference on Communications and
Multimedia Security, pp. 69-79, May 2001.
【13】R. Grosbois, P. Gerbelot, and T. Ebrahimi, Authentication and access control in
the JPEG 2000 compressed domain,” In Proc. of the SPIE 46th Annual
Meeting, Applications of Digital Image Processing XXIV, San Diego, July 29th
August 3rd, 2001.
【14】J. Chen, T.S. Chen and J.G. Chen, “Efficient sub-band coding in JPEG2000 for
improved authentication and tamper-proofing,” The Imaging Science Journal
Vol. 52 no. 3 , Sep. 2004.
【15】DEEPA KUNDUR, “Digital Watermarking for Telltale Tamper Proofing and
Authentication,” Proceedings of the IEEE, Vol. 87, Issue 7, pp. 1167-1180,
July 1999.
【16】K. Sayood, “Introduction to Data Compression-2nd edition,” 2000.
【17】C. J. Lian, K. F. Chen, H. H. Chen, and L. G. Chen, “Lifting Based Discrete
Wavelet Transform Architecture for JPEG2000,” the 2001 IEEE International
Symposium on Circuits and Systems, Vol. 2, pp. 445-448, May 2001.
【18】D. Taubman, “High Performance Scalable Image Compression with EBCOT,”
IEEE Transactions on Image Processing, Vol. 9, No. 7, pp. 1158-1170, Jul.
2000.
【19】http://www.jpeg.org/JPEG2000.html
【20】http://coecs.ou.edu/cheung/www/Images/JPEG2000/jpeg2000.html
【21】D. S. Taubman and M. W. Marcellin, “JPEG2000 Image Compression
Fundamentals, Standards and Practice,” 2002.
【22】Tinku Acharya, “JPEG2000 Standard for Image Compression : Concepts,
Algorithms and VLSI Architec.,” 2004.
【23】L.K. Chen, K.Y. Lau and Y. Trisno, “Frequency planning for nonlinear
distortion reduction in wideband transmission,” Electronics Letters, Vol.
27, Issue 14, pp. 1293-1295, 1999.
【24】Forouzan, Behrouz A “Data communications and networking,” 2004.
【25】吳炳飛、胡益強、瞿忠正,蘇崇彥,“JPEG2000影像壓縮技術”,全華科
技圖書股份有限公司,2003。
【26】張真誠、黃國峰、陳同孝,“電子影像技術”,旗標出版股份有限公司,2003。
【27】陳同孝、張真誠、黃國峰,“數位影像處理技術”,旗標出版股份有限公司,
2003。
【28】林銀議,”錯誤保護及訂正碼”,國立中央大學,2004.
【29】JJ2000, “JJ2000 An introduction to the software,”http://jpeg2000.epfl.ch. |