References
- I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' Tech. Rep. 95-10, NEC Research Institute, 1995
- W. Bender, D. Gruhl, and N. Morimoto. 'Techniques for data hiding,' Proc. of SPIE, Vol.2420, pp.40, FEB. 1995 https://doi.org/10.1117/12.205315
- E. Koch, J. Rindfrey, and J. Zhao. 'Copyright protection for multimedia data,' Proc. of the Int. Conf. on Digital Media and Electronic Publishing, 1994
- V. Solachidis, I. Pitas, Circularly Symmetric Watermark Embedding in 2-D DFT domain, Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'99), Vol.VI, pp.3469-3472, Phoenix, USA, March, 1999 https://doi.org/10.1109/ICASSP.1999.757589
- Scott Craver, Nasir Memon, Boon-Lock Yeo and Minerva Yeung. 'Can invisible watermarks resolve rightful ownerships?,' Proc. of the IS&T/SPIE Conference on Storage and Retrieval for Image and Video Databases V, Vol.3022, pp.310-321, San Jose, CA, USA, FEB. pp.13-14, 1997 https://doi.org/10.1117/12.263419
- M. Swanson, B. Zhu and A. Tewfik, Robust Data Hiding for Images, IEEE Digital Signal Processing Workshop (DSP'96), pp.37-40, Sep., 1996 https://doi.org/10.1109/DSPWS.1996.555454
- H. Kii, J. Onishi, and S. Ozawa, The Digital Watermarking Method by Using both Patchwork and DCT, Proceedings of the International Conference on Multimedia Computing and Systems, Vol.1, pp.895-899, Florence, Italy, June, 1999 https://doi.org/10.1109/MMCS.1999.779321
- J. Fridrich, A Hybrid Watermark for Tamper Detection in Digital Images, Proceedings of the Fifth International Symposium on Signal Processing and its Applications(ISSPA'99), Vol.1, pp.301-30 4, Australia, Aug., 1999 https://doi.org/10.1109/ISSPA.1999.818172
- F. Hartung and B. Girod. 'Digital watermarking of raw and compressed video,' In N. Ohta, editor, Digital Compression Technologies and Systems. For Video communications, volume 2952 of SPIE Processings Series, pp.205-213, Oct., 1996 https://doi.org/10.1117/12.251278
- V. Basia and I. Pitas, Robust Audio Watermarking in the time-domain, Proc. of EUSIPCO'98, Sep., Rhodes, Greece, 1998
- N. Nikolaidis, I. Pitas, Digital Image Watermarking : an Overview, Proceedings of the International Conference on Multimedia Computing and Systems, Vol.1, pp.1-6, Florence, Italy, June, 1999 https://doi.org/10.1109/MMCS.1999.779111
- S. Kang and Y. Aoki, Image Data Embedding System for Watermarking Using Frensnel Transform, Proceedings of the International Conference on Multimedia Computing and Systems, Vol.1, pp.885-889, Florence, Italy, June, 1999 https://doi.org/10.1109/MMCS.1999.779319
- L. Qiao and K. Nahrstedt, Watermarking Methods For MPEG Encoded Video : Towards Resolving Rightful Ownership, Technical Report UIUCDCS-R-97-2032, Dec., 1997
- E. Kock and J. Zhao. 'Towards robust and hidden image copyright labeling,' In Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, JUNE 1995
- A.G. Bors and I. Pitas, 'Image watermarking using DCT domain constraints,' Proc. IEEE Int. Conference on Multimedia Computing and Systems, pp.86-90, 1994
- Ju Han Kim, Won Don Lee and Jin Hyeong Park, 'A Watermarking Scheme Robust to IBM Attack,' Proc. of The International Conference on Multimedia and Telecommunications Management (ICMTM), Hong Kong, Dec., 1998
- Ju Han Kim, Won Don Lee and Jin Hyeong Park, 'A Watermarking with Two Signatures,' Proc. of IEEE Second Workshop on Multimedia Signal Processing, pp.394-399 LA, Dec., 1998 https://doi.org/10.1109/MMSP.1998.738968
- M. Kutter, F. Jordan, F. Bossen, 'Digital signature of color images using amplitude modulation,' Journal of Electronic Imaging, Vol.7, No.2, pp.326-332, April, 1998 https://doi.org/10.1117/1.482648