References
- M.D. Swanson, B. Zhu, and A.H. Tewfik, "Multiresolution Scene-Based Cideo Water- Marking using Perceptual Models," IEEE J ournal on Selected Areas in Communications, Vol. 16, Issue 4, pp. 540-550, 1998. https://doi.org/10.1109/49.668976
- C.V. Serdean, M.A. Ambroze, M. Tomlinson, and J.G. Wade, "DWT-based High-capacity Blind Video Watermarking, Invariant to Geometrical Attacks," IEEE Proc. Vision, Image and Signal Processing, Vol. 150, Issue 1, pp. 51-58, 2003. https://doi.org/10.1049/ip-vis:20030159
- Y. Wang and Al. Pearmain, "Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain," IEEE Trans. on Image Processing, Vol. 15, No. 6, pp. 1536-1543, 2006. https://doi.org/10.1109/TIP.2006.873476
- Jing Zhang, Anthony T.S. Ho, Gang Qiu, and Pina Marziliano, "Robust Video Watermarking of H.264/AVC," IEEE Trans. Circuits Sys. Video Tech., Vol. 54, No. 2, pp. 205-209, 2007.
- 윤지선, 이석환, 송윤철, 장봉주, 권기룡, 김민환, "MPEG-4 스케일러블 비디오 코딩 및 멀티미디어 트랜스코딩에 강인한 블라인드 비디오 워터마킹," 멀티미디어학회논문지, 제11권, 10호, pp. 1347-1358, 2008.
- A.M. Alattar, "Reversible Watermark using the Difference Expansion of A Generalized Integer Transform," IEEE Trans. Image Process., Vol. 13, No. 8, pp. 1147-1156, 2004. https://doi.org/10.1109/TIP.2004.828418
- B. Yang, M. Schmucker, C. Busch, X. Niu, and S. Sun, "Approaching Optimal Value Expansion for Reversible Watermarking," Proc. of the 7-th Workshops on Multi- media and Security, pp. 95-102, 2004.
- B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, "Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients," Proc. of the IEEE 6th Workshop on Multimedia Signal Processing, pp. 143-146, 2004.
- J.M. Zain, L.P. Baldwin, and M. Clarke, "Reversible Watermarking for Authentication of Dicom Images," Proc. of the 26th Annual International Conference of the Engineering in Medicine and Biology Society, pp. 3237-3240, 2004.
- Xiao Zeng, Zhen-Yong Chen, Ming Chen, and Zhang Xiong, "Reversible Video Watermarking using Motion Estimation and Prediction error expansion," Journal of Information Science and Engineering, Vol. 27, pp 465-479, 2011.
- Zhenyong Chen, Zhang Xiong, and Long Tang, "A Novel Scrambling Scheme for Digital Video Encryption," Proc. of Pacific-Rim Symposium on Image and Video Technology (PSIVT) , pp. 997-1006, 2006.
- Zheng Liu and Xue Li, "Motion Vector Encryption in Multimedia Streaming," Proc. of 10Th international Conference of Multimedia Modelling Conference, pp. 64-71, 2004.
- B. Furht and D. Kirovski, Multimedia Security Handbook, CRC Press LLC, 2004.
- C. Shi and Bharat Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. of ACM Multimedia, pp. 81-88, 1998.
- A. Shamir, "How to share a secret," Proc. of Communications of the ACM, Vol. 2, pp. 612-613, 1979.
- Coding of audio-visual objects-Part 2: Visual, ISO/ IEC 14492-2 (MPEG-4 Visual) , ISO/IEC JTC 1, Version 1: 1999, Version 2: 2000, Version 3: 2004.
- Advanced Video Coding for Generic Audiovisual Services, ITU-T Rec. H.264 and ISO/ IEC 14496-10 (MPEG-4 AVC) , ITU-T and ISO/ IEC JTC-1, Version 1: 2003, Version 2: 2004, Version 3: 2005, Version 4: 2005,Version 5 and Version 6: 2006, Version 7: 2007.
- Jan Bormans and Keith Hill, MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11/N5231, 2002,
- H. Schwarz, D. Marpe, and T Wiegand, "Overview of the Scalable Video Coding Extension of the H.264/AVC Standard," IEEE Trns. on Circuits and Systems for Video Technology, Vol. 17, pp. 1103-1120, 2007. https://doi.org/10.1109/TCSVT.2007.905532
- http://www.bbc.co.uk/opensource/projects/dirac/, 2011.
- http://www.xvid.org/, 2011.
- Anthony Vetro, "Transcoding Scalable Coding and Standardized Metadata," 8th International Workshop of Visual Content Processing and Representation, Vol. 2849, pp. 15-16, 2003.
- 장봉주, 이석환, 권기룡, "생물학적 바이러스를 이용한 비디오 콘텐츠의 전염성 정보은닉 시스템 모델링," 전자공학회논문지, 제49권 CI 3호, pp. 34-45, 2012.
Cited by
- Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure vol.17, pp.8, 2014, https://doi.org/10.9717/kmms.2014.17.8.953
- Reversible Watermarking based Video Contents Management and Control technique using Biological Organism Model vol.16, pp.7, 2013, https://doi.org/10.9717/kmms.2013.16.7.841
- DNA Watermarking Method based on Random Codon Circular Code vol.16, pp.3, 2013, https://doi.org/10.9717/kmms.2013.16.3.318
- Reversible Secret Sharing Scheme Using Symmetric Key Encryption Algorithm in Encrypted Images vol.18, pp.11, 2015, https://doi.org/10.9717/kmms.2015.18.11.1332
- 유한 체상에서의 사전 비밀이미지 공유 기법 vol.16, pp.5, 2013, https://doi.org/10.9717/kmms.2013.16.5.577