參考文獻 |
[1] http://www.aacsla.com/specifications/specs091/AACS Spec Prerecorded 0.91.pdf .
[2] http://iphome.hhi.de/suehring/tml/download/old jm/jm96.zip.
[3] http://www.ece.cmu.edu/?ece796/mpeg4.pdf
[4] A. Aaron, S. Rane, and B. Girod, “Wyner-Ziv Video Coding with Hash-based Motion
Compensation at the Receiver,” Proc. IEEE Int. Conf. on Image Processing,
Vol. 5, pp. 3097-3100, 2004.
[5] A. J. Ahumada and H. A. Peterson, “Luminance-model-based DCT Quantization
for Color Image Compression,” Proceedings of the SPIE, 1666: pp. 365-374, 1992.
[6] M. Alghoniemy and A. H. Tewfik, “Geometric Invariance in ImageWatermarking,”
IEEE Trans. on Image Processing, Vol. 13, No. 2, pp. 145-153, 2004.
[7] E. Ayanoglu, R. Pancha, A. R. Reibman, and S. Talwar, “Forward Error Control
for MPEG-2 Video Transport in a Wireless ATM LAN,” ACM/Baltzer Mobile Networks
and Applications, Vol. 1, No. 3, pp. 245-258, 1996.
[8] P. Bas, J. M. Chassery, and B. Macq, “Geometrically InvariantWatermarking Using
Feature Points,” IEEE Trans. Image Processing, Vol. 11, No. 9, pp.1014-1028,
2002.
[9] J. Bloom, “Security and Rights Management in Digital Cinema,” Proc. IEEE Intl.
Conf. Acoustics, Speech and Signal Processing, Vol. 4, pp. 712-715, 2003.
[10] D. Boneh and J. Shaw, “Collusion-secure Fingerprinting for Digital Data,” IEEE
Trans. Inform. Theory, Vol. 44, pp. 1897-1905, 1998.
[11] M. Chen, Y. He, and R. L. Landgelijk, “A Fragile Watermark Error Detection
Scheme for Wireless Video Communications,” IEEE Trans. on Multimedia, Vol.
7, No. 2, pp. 201-211, 2005.
[12] I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure Spread Spectrum
Watermarking for Multimedia,” IEEE Trans. Image Processing, Vol. 6, No. 12, pp.
1673-1687, 1997.
[13] I. J. Cox and M. L. Miller, “Electronic Watermarking: The First 50 Years,” Proc.
IEEE Fourth Workshop on Multimedia Signal Processing, pp. 225 -230, 2001.
[14] I. J. Cox, M. L. Miller, and J. A. Bloom, “Digital Watermarking,” Morgan Kaufmann
Publishers, 1/e, USA, 2002.
[15] S. Craver, N. Memon, BL Yeo, and M. M. Yeung, “Resolving Rightful Ownerships
with Invisible Watermarking Techniques: Limitations, Attacks, and Implications,”
IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 573-586,
1998.
[16] R. Dursternfeld, “Algorithm 235: Random Permutation [G6],” Communications of
the ACM, pp. 420, 1964.
[17] J. Fridrich, “Visual Hash for Oblivious Watermarking,” Proc. SPIE: Security and
Watermarking of Multimedia Contents II, Vol. 3971, pp. 286-294, 2000.
[18] “Draft ITU-T recommendation and final draft international standard of joint video
specification (ITU-T Rec. H.264/ISO/IEC 14 496-10 AVC,” Joint Video Team
(JVT) of ISO/IEC MPEG and ITU-T VCEG, JVTG050, 2003.
[19] C. Harris and M. Stephen, “A Combined Corner and Edge Detector,” Proc. 4th
Alvey Vision Conf., pp.147-151, 1988.
[20] F. Hartung and B. Girod, “Digital watermarking of MPEG-2 coded video in the bitstream
domain,” Proc. IEEE Intl. Conf. Acoustics, Speech and Signal Processing,
Vol. 4, pp. 2621-2624, 1997.
[21] F. Hartung and B. Girod, “Watermarking of Uncompressed and Compressed
Video,” Signal Processing, Vol. 66, No. 3, pp. 283-302, 1998.
[22] A. J. Hayter, “Probability and Statistics for Engineers and Scientists,” PWS Publishing
Company, 1995.
[23] J. R. Hernandez and F. Perez-Gonzalez, “Statistical Analysis of Watermarking
Schemes for Copyright Protection of Images,” Proc. IEEE, Vol. 87, pp. 1142-1143,
1999.
[24] A. Herrigel, S. Voloshynovskiy, Y. Rytsar, “The Watermark Template Attack,”
Proc. SPIE Security and Watermarking of Multimedia Contents III (Vol. 4314),
San Jose, 2001.
[25] L. W. Kang and C. S. Lu, “Low-Complexity Wyner-Ziv Video Coding Based on
Robust Media Hashing,” Proc. IEEE Int. Workshop on Multimedia Signal Processing,
Canada, 2006.
[26] L. W. Kang and C. S. Lu, “Wyner-Ziv Video Coding with Coding Mode Hidingbased
Motion Compensation,” Proc. IEEE Int. Conf. on Image Processing, USA,
2006.
[27] H. S. Kim and H. K. Lee, “Invariant Image Watermark Using Zernike Moments,”
IEEE Trans. on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp.
766-775, 2003.
[28] D. Kirovski and F. A. Petitolas, “Blind Pattern Matching Attack on Watermarking
Systems,” IEEE Trans. Signal Processing, Vol. 51, pp. 1045-1053, 2003.
[29] C. Kotropoulos and I. Pitas, “Rule-based Face Detection in Frontal Views,” Proc.
IEEE ICASSP, Vol. 4, pp. 2537-2540, 1997.
[30] D. Knuth, “The Art of Computer Programming,” 3rd ed. Vol. 2, Reading, Mass.:
Addison-Wesley, 1997.
[31] D. Kundur and K. Karthik, “Video Fingerprinting and Encryption Principles for
Digital Rights Management,” Proceedings of the IEEE, Vol. 92, No. 6, pp. 918-
932, 2004.
[32] M. Kutter, “Watermarking Resisting to Translation, Rotation and Scaling,” Proc.
SPIE International Symposium on Voice, Video, and Data Communication, Boston,
1998.
[33] M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi, “Toward Second Generation Watermarking
Schemes,” Proc. IEEE Int. Conf. on Image Processing, Vol. I, pp. 320-
323, 1999.
[34] M. Lee, S. Nepal, and U. Srinivasan, “Role of Edge Detection in Video Semantics,”
Proc. ACS Conferences in Research and Practice in Information Technology, Vol.
22, pp. 59-68, 2003.
[35] B. Li, E. Chang, and C. T. Wu, “DPF – A Perceptual Distance Function for Image
Retrieval,” Proc. IEEE Int. Conf. on Image Processing, Vol. 2, pp. II-597-II-600,
2002.
[36] C. Y. Lin and S. F. Chang, “A Robust Image Authentication Method Distinguishing
JPEG Compression from Malicious Manipulation,” IEEE Trans. on Circuits and
Systems for Video Tech., Vol. 11, No. 2, pp. 153-168, 2001.
[37] E. Lin, C. Podilchuk, T. Talker, and E. Delp, “Streaming Video and Rate Scalable
Compression: What Are The Challenges ForWatermarking? ” Proc. SPIE Security
and Watermarking of Multimedia Contents III, Vol. 4314, pp. 116-127, San Jose,
2001.
[38] E. Lin, C. Podilchuk, T. Talker, and E. Delp, “Temporal Synchronization in Video
Watermarking, ” Proc. SPIE Security and Watermarking of Multimedia Contents
IV, Vol. 4675, pp. 478-490, San Jose, January, 2002.
[39] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, “Rotation,
Scale and Translation Resilient Watermarking for Images,” IEEE Trans. Image
Processing, Vol. 10, No. 5, pp. 767-782, 2001.
[40] C. Y. Lin, D. Sow, and S. F. Chang, “Using Self-Authentication-and-Recovery Images
for Error Concealment in Wireless Environments,” SPIE ITCom/OptiComm,
Vol. 4518, pp. 267-274, 2001.
[41] Y. J. Liang, J. G. Apostolopoulos, and B. Girod, “Analysis of Packet Loss for Compressed
Video: Does Burst-length Matter?” Proc. IEEE Int. Conf. on Acoustics,
Speech, and Signal Processing , 2003.
[42] C. S. Lu, “Wireless Multimedia Error Resilience via A Data Hiding Technique,”
Proc. 5th IEEE Int. Workshop on Multimedia Signal Processing, pp. 316-319 ,
2002.
[43] C. S. Lu, H. Y. Liao, and M. Kutter, “Denoising and Copy Attacks ResilientWatermarking
by Exploiting Knowledge at Detector,” IEEE Trans. on Image Processing,
Vol. 11, No. 3, pp. 280-292, 2002.
[44] C. S. Lu and H. Y. Mark Liao, “Structural Digital Signature for Image Authentication:
An Incidental Distortion Resistant Scheme,” IEEE Trans. on Multimedia,
Vol. 5, No. 2, pp. 161-173, 2003.
[45] C. S. Lu and C. Y. Hsu, “Geometric Distortion-Resilient Image Hashing Scheme
and Its Applications on Copy Detection and Authentication,” ACM Multimedia
Systems Journal, special issue on Multimedia and Security, Vol. 11, No. 2, pp.
159-173, 2005.
[46] C. S. Lu, J. R. Chen, and K. C. Fan, “Real-Time Frame-Dependent Video Watermarking
in VLC Domain,” Signal Processing: Image Communication, Vol. 20, No.
7, pp. 624-642, 2005.
[47] C. S. Lu and C.Y. Hsu, “Content-Dependent Anti-Disclosure Image Watermark,”
Proc. 2nd Int. Workshop on Digital Watermarking, LNCS 2939, pp. 61-76, Seoul,
Korea, 2003.
[48] C. S. Lu, S. W. Sun, and P. C. Chang, “Robust Mesh-based Content-dependent
Image Watermarking with Resistance to Both Geometric Attack and Watermark-
Estimation Attack,” Proc. SPIE: Security, Steganography, and Watermarking of
Multimedia Contents VII (EI120), pp. 147-163, San Jose, California, USA, 2005.
[49] C. S. Lu, “Towards Robust Image Watermarking: Combining Content-Dependent
Watermark, Moment Normalization, and Side-Informed Embedding,” Signal
Processing: Image Communication, Vol. 20, No. 2, pp. 129-150, 2005.
[50] C. S. Lu and C. M. Yu, “On the Security of Mesh-based Media Hash-dependent
Watermarking Against Protocol Attacks,” Proc. IEEE Int. Conf. on Multimedia
and Expo, The Netherlands, 2005.
[51] C. S. Lu and C. Y. Hsu, “Geometric Distortion-Resilient Image Hashing Scheme
and Its Applications on Copy Detection and Authentication,” ACM Multimedia
Systems Journal, special issue on Multimedia and Security, Vol. 11, No. 2, pp.
159-173, 2005.
[52] C. S. Lu, S. W. Sun, C. Y. Hsu, and P. C. Chang, “Media Hash-dependent Image
Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks
Based on False Positive-Oriented Detection,” IEEE Trans. on Multimedia, Vol. 8,
No. 4, pp. 668-685, 2006.
[53] B. M. Macq and J. J. Quisquater, “Cryptology for digital TV broadcasting,” Proceedings
of the IEEE, Vol. 83, No. 6, pp. 944-957, 1995.
[54] A. R. Manuel and P. G. Fernando, “Analysis of Pilot-based Synchronization Algorithms
for Watermarking of Still Images,” Signal Processing: Image Communication,
Vol. 17, pp. 611-633, 2002.
[55] Y. Mao and M.Wu, “Security Evaluation for Communication-Friendly Multimedia
Encryption,” Proc. IEEE Intl. Conf. Image Processing, 2004.
[56] Y. Mao and M. K. Mihcak, “Collusion-Resistant Intentional De-Synchronization
for Digital Video Fingerprinting,” submitted to IEEE Trans. on Image Processing,
Dec. 2005, preliminary version was published in Proc. IEEE Intl. Conf. Image
Processing, 2005.
[57] K. Mikolajczyk and C. Schmid, “An Affine Invariant Interest Point Detector,” Proc.
ECCV, LNCS 2350, pp. 128-142, 2002.
[58] I. Moccagatta, A. Soudagar, J. Liang, and H. Chen, “Error-Resilient Coding in
JPEG-2000 and MPEG-4,” IEEE Journal on Selected Area in Communications,
Vol. 18, No. 6, pp. 899-914, 2000.
[59] A. Nikolaidis and I. Pitas, “Region-based Image Watermarking,” IEEE Trans. on
Image Processing, Vol. 10, No. 11, pp. 1726-1740, 2001.
[60] A. Ortega and K. Ramchandran, “Rate-distortion methods for image and video
compression,” IEEE Signal Processing Magazine, Vol. 15, pp. 23-50, 1998.
[61] J. O’Ruanaidh and T. Pun, “Rotation, Scale and Translation Invariant Spread Spectrum
Digital ImageWatermarking,” Signal Processing, Vol.66, No. 3, pp. 303-317,
1998.
[62] S. Pereira, T. Pun, “Robust Template Matching for Affine Resistant Image Watermarks,”
IEEE Trans. Image Processing, Vol. 9, No. 6, pp. 1123-1129, 2000.
[63] S. Pereira, T. Pun, “An Iterative Template Matching Algorithm Using the Chirp-
Z Transform for Digital Image Watermarking,” Pattern Recognition , Vol. 33, pp.
173-175, 2000.
[64] F. Petitcolas, R. J. Anderson, and M. G. Kuhn, “Attacks on Copyright Marking
Systems,” Proc. Int. Workshop on Information Hiding, LNCS 1575, pp. 219-239,
1998.
[65] F. Petitcolas, “Watermarking Schemes Evaluation,” IEEE Signal Processing Magazine,
Vol. 17, No. 5, pp. 58-64, 2000.
[66] W. Pongpadpinit and A. Pearmain, “Recovery of Motion Vectors for Error Concealment
Based on an Edge-Detection Approach,” IEE Proc.-Vis. Image Signal
Process., Vol. 153, No. 1, pp. 63-69, 2006.
[67] R. Puri, K. Ramchandran, K. W. Lee, and V. Bharghavan, “Forward Error Correction
(FEC) Codes Based Multiple Description Coding for Internet Video Streaming
and Multicast,” Signal Processing: Image Communication, Vol. 16, pp. 745-762,
2001.
[68] M. Ramkumar and A. N. Akansu, “A Robust Scheme for Oblivious Detection of
Watermarks/Data Hiding in Still Images,” Proc. SPIE Multimedia Systems and Applications,
Vol. 3528, pp. 474-481, 1998.
[69] N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing Security and Privacy in
Biometrics-based Authentication Systems,” IBM Systems Journal, Vol. 40, No. 3,
pp. 614-634, 2001.
[70] K. C. Roh, K. D. Seoa, and J. K. Kim “Data Partitioning and Coding of DCT
Coefficients Based on Requantization for Error-Resilient Transmission of Video,”
Signal Processing: Image Communication, Vol. 17, pp. 573-585, 2002.
[71] A. Sehgal, A. Jagmohan, and N. Ahuja, “Wyner-Ziv Coding of Video: An Error-
Resilient Compression Framework,” IEEE Trans. on Multimedia, Vol. 6, No. 2, pp.
249-258, 2004.
[72] J. S. Seo and C. D. Yoo, “Localized Image Watermarking Based on Feature Points
of Scale-Space Representation,” Pattern Recognition, Vol. 37, pp. 1365-1375,
2004.
[73] T. Shanableh and M. Ghanbari, “Loss Concealment Using B-Pictures Motion Information,”
IEEE Trans. on Multimedia, Vol. 5, No. 2, pp. 249-258, 2003.
[74] C. Shi and B. Bhargava, “A fast MPEG video encryption algorithm,” Proc. ACM
Conf. on Multimedia, pp. 81-88, 1998.
[75] S. Shirani, F. Kossentini, and R. Ward, “A Concealment method for Video Communications
in an Error-Prone Environment”, IEEE Journal on Selected Areas in
Communications, Vol. 18, No. 6, pp. 1122-1128, 2000.
[76] D. Simitopoulos, D. E. Koutsonanos, and M. G. Strintzis, “Robust Image Watermarking
Based on Generalized Radon Transformations,” IEEE Trans. on Circuits
and Systems for Video Technology, Vol. 13, No. 8, pp. 732-745, 2003.
[77] V. Solachidis and I. Pitas, “Circularly Symmetric Watermark Embedding in 2-D
DFT Domain,” IEEE Trans. on Image Processing, Vol. 10, No. 11, pp. 1741-1753,
2001.
[78] J. Song and K. J. R. Liu, “A Data Embedded Video Coding Scheme for Error-Prone
Channels,” IEEE Trans. on Multimedia, Vol. 3, No. 4, pp. 415-423, 2001.
[79] S. Stankovic, I. Djurovic, and I. Pitas, “Watermarking in the Space/Spatial-
Frequency Domain Using Two-Dimensional Radon-Wigner Distribution,” IEEE
Trans. on Image Processing, Vol. 10, No. 4, pp. 650-658, 2001.
[80] H. Stark, J. W. Woods, “Probability and Random Processes with Applications to
Signal Processing,” Prentice Hall, 3/e, New Jersey, 2002.
[81] K. Su, D. Kundur, and D. Hatzinakos, “Statistical Invisibility for Collusionresistant
Digital Video Watermarking,” IEEE Transactions on Multimedia, Vol. 7,
No. 1, pp. 43-51, 2005.
[82] K. Su, D. Kundur, and D. Hatzinakos, “Spatially Localized Image-dependent Watermarking
for Statistical Invisibility and Collusion Resistance,” IEEE Transactions
on Multimedia, Vol. 7, No. 1, pp. 52-66, 2005.
[83] S.W. Sun, J. R. Chen, C. S. Lu, and P. C. Chang, “Video JET: Packet Loss-Resilient
Video Joint Encryption and Transmission based on Media-Hash-Embedded Residual
Data,” submitted to IEEE Trans. on Circuits and Systems for Video Technology.,
Feb. 2007, preliminary version was published in Proc. SPIE Conf. Electronic Imaging,
San Jose, CA, USA, 2006.
[84] M. D. Swanson, B. Zhu, and A. T. Tewifk, “Multiresolution Scene-based Video
Watermarking Using Perceptual Models,” IEEE J. Select. Areas Commun., Vol. 16,
pp. 540-550, 1998.
[85] C.W. Tang and H. M. Hang, “A Feature-Based Robust Digital ImageWatermarking
Scheme,” IEEE Trans. Signal Processing, Vol. 51, No. 4, pp.950-958, 2003.
[86] A. Tosun and W. C. Feng, “On Error Preserving Encryption Algorithms for Wireless
Video Transmission,” Proc. ACM Conf. on Multimedia, pp. 302-308, 2001.
[87] W. Trappe, M. Wu, and K. J. R. Liu, “Collusion-resistant Fingerprinting for Multimedia,”
Proc. IEEE Intl. Conf. Acoustics, Speech and Signal Processing, Vol. 4,
pp. 3309-3312, 2002.
[88] W. Trappe, M.Wu, Z. J.Wang, and K. J. R. Liu, “Anti-collusion Fingerprinting for
Multimedia,” IEEE Trans. Signal Processing, Vol. 51, pp. 1069-1087, 2003.
[89] S. Tsekeridou and I. Pitas, “MPEG-2 Error Concealment Based on Block-Matching
Principles,” IEEE Trans. on Circuits and System for Video Technology, Vol. 10, No.
4, pp. 646-658, 2000.
[90] S.Voloshynovskiy, A.Herrigel, N.Baumgartner and T.Pun, “A Stochastic Approach
to Content Adaptive Digital Image Watermarking,” Proc. Int. Workshop on Information
Hiding, LNCS 1768, pp. 211-236, 1999.
[91] S. Voloshynovskiy, F. Deguillaume, and T. Pun, “Multibit Digital Watermarking
Robust Against Local Nonlinear Geometrical Distortions,” Proc. IEEE Int. Conf.
Image Processing, Thessaloniki, pp. 999-1002, 2001.
[92] S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, “Attack Modeling: Towards
a Second Generation Watermarking Benchmark,” Signal Processing, Vol. 81, pp.
1177-1214, 2001.
[93] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image Quality Assessment:
From Error Visibility to Structural Similarity,” IEEE Trans. on Image
Processing, Vol. 13, No. 4, pp. 600-612, 2004.
[94] J. Wen, M. Severa, W. Zeng, M. H. Luttrell, and W. Jin, “A Format-compliant
Configurable Encryption Framework for Access Control of Video,” IEEE Trans.
on Circuits and Systems for Video Technology, Vol. 12, No. 6, pp. 545-557, 2002.
[95] M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, “Collusion-Resistant Fingerprinting
for Multimedia,” IEEE Signal Processing Magazine, pp. 15-27, 2003.
[96] X. Xu, S. Dexter, and A. M. Eskicioglu, “A Hybrid Scheme of Encryption and
Watermarking,” IS&T/SPIE Symposium on Electronic Imaging 2004, Security,
Steganography, and Watermarking of Multimedia Contents VI Conference, Vol.
5306, pp. 725-736, 2004.
[97] G. Yang and T.S. Huang, “Human Face Detection in Complex Background,” Pattern
Recognition, Vol. 27, no. 1, pp. 53-63, 1994.
[98] M. H. Yang, D. J. Krieman, and N. Ahuja, “Detection Faces in Images: A Survey,”
IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 24, No. 1, pp. 34 -58,
2002.
[99] P. Yin, M. Wu, and B. Liu, “A Robust Error Resilient Approach for MPEG
Video Transmission over Internet,” Proc. SPIE: Visual Communication and Image
Processing, Vol. 4671, pp. 103-111, 2002.
[100] H. Zhao, M. Wu, Z.J. Wang, and K. J. R. Liu, “Nonlinear Collusion Attacks on
Independent Fingerprints for Multimedia,” Proc. IEEE Intl. Conf. Acustic, Speech,
Signal Processing 2003, pp. I-613-I-616, 2003.
[101] H. Zhao and K. J. R. Liu, “Fingerprint Multicast in Secure Video Streaming,” IEEE
Trans. Image Processing, Vol. 15, No. 1, pp. 12-28, 2006.
[102] W. Zeng and S. Lei, “Efficient Frequency Domain Selective Scrambling of Digital
Video,” IEEE Trans. on Multimedia, Vol. 5, No. 1, pp. 118-129, 2003.
[103] D. Zheng, J. Zhao, and A. El Saddik, “RST-Invariant Digital Image Watermarking
Based on Log-Polar Mapping and Phase Correlation,” IEEE Trans. on Circuits and
Systems for Video Technology, Vol. 13, No. 8, pp. 753-765, 2003.
[104] W. Zeng, X. Zhuang, and J. Lan, “Network Friendly Media Security: Rationales,
Solutions, and Open Issues,” Proc. IEEE Int. Conf. on Image Processing, Vol. 1,
pp. 565-568, 2004.
[105] P. Zhu and P. M. Chirlian, “On Critical Point Detection of Digital Shapes,” IEEE
Trans. Pattern Analysis and Machine Intelligence, Vol. 17, No. 8, pp. 737-748,
1995.
[106] B. B. Zhu, M. D. Swanson, A. H. Tewfik, “When seeing isn’t believing [multimedia
authentication technologies],” IEEE Signal Processing Magazine, Vol. 21, No. 2,
pp. 40-49, 2004.
[107] B. B. Zhu, C. Yuan, Y. Wang and S. Li, “Scalable Protection for MPEG-4 Fine
Granularity Scalability,” IEEE Trans. on Multimedia, Vol. 7, No. 2, pp. 222-233,
2005. |