參考文獻 |
[1] A.J. Ahumada and H.A. Peterson. Luminance-model-based DCT quantization for color image compression. Human vision, visual processing,
and digital display III, pages 365-74, 1992.
[2] J. Babaud, A.P. Witkin, M. Baudin, and R.O. Duda. Uniqueness of the
Gaussian kernel for scale-space ltering. IEEE Transactions on Pattern
Analysis and Machine Intelligence, 8(1):26-33, 1986.
[3] P. Bas, J.M. Chassery, and B. Macq. Geometrically invariant water-
marking using feature points. IEEE Transactions on Image Processing,
11(9):1014-1028, 2002.
[4] I. Biehl and B. Meyer. Protocols for collusion-secure asymmetric nger-
printing. In STACS 97, pages 399-412. Springer, 1997.
[5] G. Blakley, C. Meadows, and G. Purdy. Fingerprinting long forgiving
messages. In Advances in CryptologyXCRYPTO85 Proceedings, pages
180-189. Springer, 1986.
[6] D. Boneh and J. Shaw. Collusion-Secure Fingerprinting for Digital
Data. In Advances in cryptology, CRYPTO'95: 15th Annual Interna-
tional Cryptology Conference, Santa Barbara, California, USA, August
27-31, 1995: proceedings, page 452. Springer, 1995.
[7] D. Boneh and J. Shaw. Collusion-secure ngerprinting for digital data.
IEEE Transactions on Information Theory, 44(5):1897-1905, 1998.
[8] I. Cox, M. Miller, and J. Bloom. Digital watermark: Principle and
practice, 2001.
[9] I.J. Cox, M.L. Miller, K. Tanaka, and Y. Wakasu. Digital watermarking,
June 22 1999. US Patent 5,915,027.
[10] C. De Vleeschouwer, J.F. Delaigle, and B. Macq. Invisibility and ap-
plication functionalities in perceptual watermarkingXan overview. Pro-
ceedings of the IEEE, 90(1), 2002.
[11] X. Gao, C. Deng, X. Li, and D. Tao. Geometric Distortion Insensitive
Image Watermarking in A ne Covariant Regions. IEEE transactions
on systems, man and cybernetics. Part C, Applications and reviews,
40(3):278-286, 2010.
[12] C. Harris and M. Stephens. A combined corner and edge detector. In
Alvey vision conference, volume 15, page 50. Manchester, UK, 1988.
[13] A. Herrigel, S. Voloshynovskiy, and Y. Rytsar. The watermark tem-
plate attack. In Proc. SPIE Security and Watermarking of Multimedia
Contents III, volume 4314, pages 394-405. Citeseer, 2001.
[14] O.R. JJK and T. Pun. Rotation, scale and translation invariant spread
spectrum digital image watermarking. Signal Processing, 66(3):303-317,
1998.
[15] D. Kirovski, F.A.P. Petitcolas, and Z. Landau. The Replacement At-
tack. IEEE Transactions on Audio, Speech, and Language Processing,
15(6):1922-1931, 2007.
[16] J.J. Koenderink. The structure of images. Biological cybernetics,
50(5):363-370, 1984.
[17] M. Kutter. Watermarking resisting to translation, rotation, and scaling.
In Proceedings of SPIE- The International Society for Optical Engineer-
ing, volume 3528, pages 423-431. Citeseer, 1999.
[18] M. Kutter, S.K. Bhattacharjee, and T. Ebrahimi. Towards second gener-
ation watermarking schemes. In IEEE Int Conf Image Process, volume 1,
pages 320-323, 1999.
[19] C.Y. Lin, M. Wu, JA Bloom, IJ Cox, ML Miller, and YM Lui. Ro-
tation, scale, and translation resilient watermarking for images. IEEE
Transactions on Image Processing, 10(5):767-782, 2001.
[20] T. Lindeberg. Scale-space theory: A basic tool for analyzing structures
at di erent scales. Journal of applied statistics, 21(1):225-270, 1994.
[21] D.G. Lowe. Distinctive image features from scale-invariant keypoints.
International journal of computer vision, 60(2):91-110, 2004.
[22] W. Lu, H. Lu, and F.L. Chung. Feature based watermarking using
watermark template match. Applied Mathematics and computation,
177(1):377-386, 2006.
[23] BS Manjunath, C. Shekhar, and R. Chellappa. A new approach to image
feature detection with applications* 1. Pattern Recognition, 29(4):627-640, 1996.
[24] K. Mikolajczyk and C. Schmid. Scale & a ne invariant interest point
detectors. International Journal of Computer Vision, 60(1):63-86, 2004.
[25] M. Miller and J. Bloom. Computing the probability of false watermark
detection. In Information Hiding, pages 146-158. Springer, 2000.
[26] H.A. Peterson, H. Peng, JH Morgan, and W.B. Pennebaker. Quantiza-
tion of color image components in the DCT domain. In Proceedings of
SPIE, volume 1453, page 210, 1991.
[27] F.A.P. Petitcolas. Watermarking schemes evaluation. IEEE Signal Pro-
cessing Magazine, 17(5):58-64, 2000.
[28] B. P tzmann and M. Waidner. Asymmetric ngerprinting for larger
collusions. In Conference on Computer and Communications Security:
Proceedings of the 4 th ACM conference on Computer and communi-
cations security. Association for Computing Machinery, Inc, One Astor
Plaza, 1515 Broadway, New York, NY, 10036-5701, USA,, 1997.
[29] JS Seo and CD Yoo. Image watermarking based on invariant regions
of scale-space representation. IEEE transactions on Signal Processing,
54(4):1537-1549, 2006.
[30] P. Shelby and P. Thierry. Robust template matching for a ne resis-
tant image watermarks. IEEE Transactions on Image Processing. v9 i6,
pages 1123-1129.
[31] W.D. Smith. Studies in computational geometry motivated by mesh
generation. 1989.
[32] N.R. Wagner. Fingerprinting. In Proceedings of the 1983 IEEE Sympo-
sium on Security and Privacy, page 18. IEEE Computer Society, 1983.
|