參考文獻 |
[1] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, "Digital Watermarking and Steganography," 2007.
[2] M. Barni, "Effectiveness of exhaustive search and template matching against watermark desynchronization," Signal Processing Letters, IEEE, vol. 12, pp. 158-161, 2005.
[3] J. J. K. Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking1," Signal processing, vol. 66, pp. 303-317, 1998.
[4] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui, "Rotation, scale, and translation resilient watermarking for images," Image Processing, IEEE Transactions on, vol. 10, pp. 767-782, 2001.
[5] D. Zheng, J. Zhao, and A. El Saddik, "RST-invariant digital image watermarking based on log-polar mapping and phase correlation," Circuits and Systems for Video Technology, IEEE Transactions on, vol. 13, pp. 753-765, 2003.
[6] S. Pereira and T. Pun, "Robust template matching for affine resistant image watermarks," Image Processing, IEEE Transactions on, vol. 9, pp. 1123-1129, 2000.
[7] M. Kutter, G. Teschar Andrew, B. Vasudev, V. M. Bove, and B. Derryberry, "Watermarking resisting to translation, rotation, and scaling," SPIE proceedings series, vol. 3528, pp. 423-431, 1999.
[8] P. C. Su and C. C. J. Kuo, "Synchronized detection of the block-based watermark with invisible grid embedding," in SPIE Photonics West, vol. 4314, pp. 423–431, 2001.
[9] M. Kutter, S. K. Bhattacharjee, and T. Ebrahimi. (1999, 1999) Towards second generation watermarking schemes. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 320-323 vol.1.
[10] H. Alexander, V. Sviatoslav, R. Yuriy, and W. Ping Wah, "The watermark template attack," SPIE proceedings series, vol. 4314, pp. 394-405, 2001.
[11] S. Manjunath B, C. Shekhar, and R. Chellappa, "A new approach to image feature detection with applications," Pattern recognition, vol. 29, pp. 627-640, 1996.
[12] P. Bas, J. M. Chassery, and B. Macq, "Geometrically invariant watermarking using feature points," Image Processing, IEEE Transactions on, vol. 11, pp. 1014-1028, 2002.
[13] J. S. Seo and C. D. Yoo, "Image watermarking based on invariant regions of scale-space representation," Signal Processing, IEEE Transactions on, vol. 54, pp. 1537-1549, 2006.
[14] G. Xinbo, D. Cheng, L. Xuelong, and T. Dacheng, "Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 40, pp. 278-286, 2010.
[15] W. Xiangyang, W. Jun, and N. Panpan, "A New Digital Image Watermarking Algorithm Resilient to Desynchronization Attacks," Information Forensics and Security, IEEE Transactions on, vol. 2, pp. 655-663, 2007.
[16] Z. Dong, W. Sha, and Z. Jiying, "RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes," Image Processing, IEEE Transactions on, vol. 18, pp. 1055-1068, 2009.
[17] T. Jen-Sheng, H. Win-Bin, and K. Yau-Hwang, "On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking," Image Processing, IEEE Transactions on, vol. 20, pp. 735-743, 2011.
[18] C. Harris and M. Stephens, "A combined corner and edge detector," in Alvey vision conference, vol. 15, p. 50, 1988.
[19] G. Lowe D, "Distinctive image features from scale-invariant keypoints," International Journal of Computer Vision, vol. 60, pp. 91-110, 2004.
[20] K. Mikolajczyk and C. Schmid, "Scale & affine invariant interest point detectors," International Journal of Computer Vision, vol. 60, pp. 63-86, 2004.
[21] P. F. A. P, S. Martin, R. Frederic, D. Jana, F. Caroline, F. Nazim, and W. Ping Wah, "A public automated web-based evaluation service for watermarking schemes: StirMark benchmark," SPIE proceedings series, vol. 4314, pp. 575-584, 2001.
[22] A. B. Watson, "Visually optimal DCT quantization matrices for individual images," in Data Compression Conference, 1993. DCC ’’93., 1993, pp. 178-187.
[23] S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, and T. Pun, "A stochastic approach to content adaptive digital image watermarking," in Information Hiding, pp. 211-236, 2000.
|