참고문헌
- S. Craver, et al., 'Resolving rightful ownership with invisible watermarks techniques : limitations, attacks, and implications,'IEEE Journal of Selected Areas in Communications, Vol.16, No.4, pp.573-586, 1998 https://doi.org/10.1109/49.668979
- E. Koch and J. Rindfrey and J. Zhao, 'Copyright Protection for Multimedia Data,' In Digital Media and Electronic Publishing Academic Press, London, pp.203-213, 1996
- A. Bors and I. Pitas, 'Image Watermarking Using DCT Domain Constraints,' in Proc. IEEE Int. Conf. on Image Processing, Lausanne, Switzerland, pp.231-234, September, 1996 https://doi.org/10.1109/ICIP.1996.560426
- I. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Transactions on Image Processing, Vol. 6, pp. 1673-1687, Dec. 1997 https://doi.org/10.1109/83.650120
- J. Piva, M. Barni, F. Bartolini and V. Cappellini, 'DCT-based Watermarking Resorting to the Uncorrupted Original Image', IEEE Int. Conf. on Image Processing 1997 https://doi.org/10.1109/ICIP.1997.647964
- G. Langelaar, R. Lagendijk, and J. Biemond, 'Watermarking by DCT Coefficient Removal : Statistical Approach to Optimal Parameter Settings,' in SPIE Photonics West, San Jose, CA, http://www-it.et.tudelft.nl/~gerhard/spie99.zip, January, 1999 https://doi.org/10.1117/12.344659
- M. D. Swanson, M. Kobayashi and A. H. Tewfik, 'Multimedia Data Embedding and Watermarking Technologies,'in Proc. IEEE., Vol.86(6), pp.1064-1087, 1998 https://doi.org/10.1109/5.687830
- P. Bas, J. Chassery, and B. Macq, 'Geometrically Invariant Watermarking Using Features Points,' IEEE Trans, Image Processing, vol. 11, no. 9, Sep, 2002 https://doi.org/10.1109/TIP.2002.801587
- C. Lin, M. Wu, J. Bloom, I. Cox, M. Miller, and Y. LUl, 'Rotation, Scale, and Translation Resilient Watermarking for Images,' IEEE Trans, Image Processing, vol. 10, no. 5, May. 2001 https://doi.org/10.1109/83.918569
- Jpseph J, K. Ruanaidh and Thierry Pun, 'Rotation, Scale, and Translation Invariant Digital Image Watermarking,' ICIP, pp.536-539, Santa Babara, 1997 https://doi.org/10.1109/ICIP.1997.647968
- Earl Gose, Richard Johnsonbaugh, Steve Jost, Pattern recognition and image analysis, Prentice Hall, pp.372-379, 1996
- A. B. Watson, 'DCT Quantization Matrices Visually Optimized for Individual Images,' in Proc. SPIE, Bellingham, WA, pp.202-216, 1993 https://doi.org/10.1117/12.152694
- Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, pp.201-240, 2002
- C. T. Hsu and J. L. Wu, 'Hidden digital watermarks in images,' IEEE Trans. on Image Proc., vol. 8, no. 1, pp. 58-68, Jan. 1999 https://doi.org/10.1109/83.736686
- S. Craver, et al., 'Resolving rightful ownership with invisible watermarks techniques: limitations, attack, and implications, IEEE Journal of Selected Areas in Communications, vol.16, no.4, pp.573-586, 1998 https://doi.org/10.1109/49.668979
- B. T. Hannigan, A. Reed, B. Bradley, 'Digital watermarking using improved human visual system model,' Proc. SPIE, vol. 4314, pp.468-474, 2001 https://doi.org/10.1117/12.435430