參考文獻 |
[1] F. Aurenhammer. Voronoi diagrams - a survey of a fundamental geometric data structure. ACM Computing Surveys (CSUR), 23(3):345-405, 1991.
[2] P. Bas, J.M. Chassery, and B. Macq. Geometrically invariant watermarking using feature points. IEEE Transactions on Image Processing, 11(9):1014-1028, 2002.
[3] I. Cox, M. Miller, and J. Bloom. Digital watermark: Principle and practice, 2001.
[4] X. Gao, C. Deng, X. Li, and D. Tao. Geometric Distortion Insensitive Image Watermarking in A ne Covariant Regions. IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews, 40(3):278-286, 2010.
[5] C. Harris and M. Stephens. A combined corner and edge detector. In Alvey vision conference, volume 15, page 50. Manchester, UK, 1988.
[6] A. Herrigel, S. Voloshynovskiy, and Y. Rytsar. The watermark template attack. In SPIE Security and Watermarking of Multi-media Contents III, volume 4314, pages 394-405. Citeseer, 2001.
[7] M. Kutter. Watermarking resisting to translation, rotation, and scaling. In SPIE The International Society for Optical Engineering, volume 3528, pages 423-431. Citeseer, 1999.
[8] M. Kutter, S.K. Bhattacharjee, and T. Ebrahimi. Towards second generation watermarking schemes. In IEEE International Confernece on Image Process, volume 1, pages 320-323, 1999.
[9] D.G. Lowe. Distinctive image features from scale-invariant key-points. International journal of computer vision, 60(2):91-110, 2004.
[10] B.S. Manjunath, C. Shekhar, and R. Chellappa. A new approach to image feature detection with applications. Pattern Recognition, 29(4):627-640, 1996.
[11] K. Mikolajczyk and C. Schmid. Scale & a ne invariant interest point detectors. International Journal of Computer Vision, 60(1):63-86, 2004.
[12] S. Pereira and T. Pun. Fast robust template matching for a neresistant image watermarks. In Information Hiding, pages 199-210. Springer, 1999.
[13] F.A.P. Petitcolas, M. Steinebach, F. Raynal, J. Dittmann,
C. Fontaine, and N. Fates. A public automated web-based evaluation service for watermarking schemes: StirMark benchmark. In SPIE proceedings series, pages 575-584. Society of Photo-Optical Instrumentation Engineers, 2001.
[14] J. Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal processing, 66(3):303-317, 1998.
[15] J. Seo and C. Yoo. Image watermarking based on invariant regions of scale-space representation. IEEE transactions on Signal Processing, 54(4):1537-1549, 2006.
[16] S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun. A stochastic approach to content adaptive digital image watermarking. In Information Hiding, pages 211-236. Springer, 1999.
[17] X. Wang, J. Wu, and P. Niu. A new digital image watermarking algorithm resilient to desynchronization attacks. IEEE Transactions on Information Forensics and Security, 2(4):655-663, 2007.
[18] A.B. Watson. Visually optimal DCT quantization matrices for individual images. In Data Compression Conference, pages 178-187. Citeseer, 1993.
[19] D. Zheng, S. Wang, and J. Zhao. RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. IEEE Transactions on Image Processing, 18(5):1055-1068, 2009.
[20] D. Zheng, J. Zhao, and A. El Saddik. RST-invariant digital image watermarking based on log-polar mapping and phase correlation. IEEE transactions on circuits and systems for video technology, 13(8):753-765, 2003.
|