References
- F. Mintzer, J. Lotspiech, and N. Morimoto, "Safeguarding digital library contents and users: digital watermarking," D-Lib Magazine, 1997.
- I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
- P. H. W. Wong, C. Andy, and O. C. Au, "On improving the iterative watermark embedding technique for JPEG-to-JPEG watermarking," Proc. of the International Symposium on Circuits and Systems, pp.161-164, 2004.
- X. Shi, F. Liu, D. Gong, and J. Jing, "An Authentication Watermark Algorithm for JPEG images," Proc. of the International Conference on Availability, Reliability and Security, pp.584-588, 2009.
- X. Q. Zhou, H. K. Huang, and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. Medical Imaging, Vol.20, No.8, pp.784-791, Aug., 2001. https://doi.org/10.1109/42.938246
- A. U. Rajendra, D. Anand, B. P. Subbanna, and U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Information Technology in Biomedicine, Vol.5, No.4, pp.320-323, Dec., 2001. https://doi.org/10.1109/4233.966107
- 강태환, 장호현, 김동서, 주낙근, "이미지 인증과 변형 검출을 위한 DWT기반 다중워터마킹," 한국콘텐츠학회 2005 추계종합 학술대회 논문집, Vol.3, No.2, pp.480-484, 2005.
- P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol.38, No.12, pp.2519-2529, Dec., 2005. https://doi.org/10.1016/j.patcog.2005.02.007
- 김효철, "히스토그램 보정을 이용한 고신뢰성 영상 인증 기법," Journal of Korea Multimedia Society, Vol.13, No.7, pp.1088-1094, July, 2010.
- S. Emmanuel, H. C. Kiang, and A. Das, "A Reversible Watermarking Scheme for JPEG-2000 Compressed Images," Proc. of the IEEE International Conference on Multimedia and Expo, pp.69-72, 2005.
- J. M. Zain and M. Clarke, "Reversible Watermarking Surviving JPEG Compression," Proc. of the International Conference of IEEE Engineering in Medicine and Biology Society, Vol.4, pp.3759-3762, 2005.
- A. Shiozaki, M. Iwata, and A. Ogihara, "Reversible Watermarking Method for JPEG Image," IEICE Trans. on Information and Systems, Vol.E91-D, No.7, pp.2068-2071, 2008. https://doi.org/10.1093/ietisy/e91-d.7.2068
- X. Wang, J. Wang, and H. Peng, "A Semi-fragile Image Watermarking Resisting to JPEG Compression," Proc. of the International Conference on Management of e-Commerce and e-Government, pp.498-502, 2009.
- H. Wang and C. Liao, "Compressed-domain fragile watermarking scheme for distinguishing tampers on image content or watermark", Proc. of the International Conference on Communications, Circuits and Systems, pp.480-484, 2009.
- R. Caldelli, F. Filippini, and R. Becarelli, "Reversible Watermarking Techniques: An Overview and a Classification," EURASIP Journal on Information Security, Vol.2010, Article ID. 134546, 2010.
- M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005. https://doi.org/10.1109/TIP.2004.840686
- S. Lee, C. D. Yoo, and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007. https://doi.org/10.1109/TIFS.2007.905146
- 최학남, 김종원, 최종욱, 김학일, "JPEG 압축 영역에서의 리버 서블 워터마킹", 정보처리학회논문지, Vol.17, pp.121-130, 2007.
- 여동규, 이해연, "차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘", 정보처리학회논문지, Vol.18-B, No.6, 2011.