References
- I. Cox, J. Kilian, T. Leighton and T.Shamoon. 'Secure Spread SpectrumWatermarking for multimedia'. NECResearch Inst. Tech. Report, 95-10, 1995
- I. Cox, M.L Miller. 'A review ofwatermarking and the importance ofperceptual modeling'. In Proc. of SPIE Human Vision and electronic imaging II,v.3016, pp92-99, 1997
- G. B. Rhoads. 'Identification/authenticationcoding method and apparatus'. WorldIntellectual Property Organization, WIPOWO 95/14289, 1995
- W. Bender, D. Gruhl, N. Morimoto.'Techniques for data hiding'. In Procee-dings of SPIE, vo1.2420, pp.40, Feb 1995
- G. Caronni. 'Assuring ownership rights fordigital images'. In Proceedings Reliable ITSystem, VIS'95. Viewing PublishingCompany, pp.251-263, 1995
- F. M. Boland, J. J. K. O Ruanaidh and W. J.Dowling. 'Watermarking digital images forcopyright protection'. In IEEE Proceedingson Vision, Signal and Image Processing,v.143, n.4, pp.250-256, 1996 https://doi.org/10.1049/ip-vis:19960711
- I. Pitas. 'A method for signature casting ondigital images'. In Proc. of the InternationalConference on Image Processing, v.3,pp.215-218, 1996 https://doi.org/10.1109/ICIP.1996.560422
- E. Koch and J. Zhao. 'Towards robust andhidden image copyright labeling' In Proc.of IEEE Workshop of Nonlinear Signal andImage Processing, Halkidiki, Greece, 1995
- D Kundur and D Hatzinakos. 'Digitalwatermarking using multiresolution waveletdecomposition'. In International Conferenceon Acoustic, Speech, and SignalProcessmg(ICASP), Seattle, USA, v.5,pp.2269-2972, 1998
- S. Craver, N. Memon, B. Yeo and M.Yeung. 'Can Invisible Watermarks ResolveRightful Owne- rships?'. IBM ResearchReport, RC 20509, 1996
- M. Barni, F. Bartolini, V. Cappellini and A.Piva, 'A DCT-domain system for robustimage watermarking'. Signal Processing,v.66, n.3, pp.357-372, 1998(Specia1 Issue on'Watermarking') https://doi.org/10.1016/S0165-1684(98)00015-2
- A. Teolis. Computational Signal Processingwith wavelets. Birkhauser, 1998
- I. Daubechies. Wavelets. Philadelphia.S.I.A.M 1992
- D.L. Donoho, 'De-noising by softthresholding'. IEEE Trans. InformationTheory, v.41, n.3, pp.613-627, 1995 https://doi.org/10.1109/18.382009