UCI Embedder: A Real-time Broadcast-Content-Identifier Watermarking System for Broadcast Content Distribution Services |
Kim, Youn-Hee
(Electronics and Telecommunications Research Institute, Broadcasting & Telecommunications Media Research Department)
Kim, Hyun-Tae (CK&B Co., Ltd. Research Institute) Lee, Joo-Young (Electronics and Telecommunications Research Institute, Broadcasting & Telecommunications Media Research Department) Nam, Je-Ho (Electronics and Telecommunications Research Institute, Broadcasting & Telecommunications Media Research Department) |
1 | M. Wu and B. Liu, "Watermarking for image authentication," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 437-441. |
2 | D. Kundur and D. Hatzinakos, "Towards a telltale watermarking technique for tamper-proofing," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 409-413. DOI |
3 | Liehua Xie and G.R. Arce, "Joint wavelet compression and authentication watermarking," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 427-431. DOI |
4 | TTA KICS.OT-10.0058, "Universal Content Identifier (Standard on Digital Content Identification: Universal Content Identifier)," December 2008. |
5 | IETF RFC4179, S Kang, "Using Universal Content Identifier (UCI) as Uniform Resource Names (URN)," http://www.ietf.org/rfc/rfc4179.txt?number=4179), September 2005. |
6 | Yoonsik Uhm, Zion Hwang, Minsoo Lee, Jaehoon Nah, Hwangjun Song, and Sehyun Park, "Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management," ETRI Journal, vol. 32, no. 5, October 2010, pp. 665-675. DOI ScienceOn |
7 | I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, vol. 6, no. 12, 1997, pp. 1673-1687. DOI ScienceOn |
8 | Conting service, http://www.conting.co.kr. |
9 | M. Kutter, "Watermarking resisting to translation, rotation and scaling", in Proceedings of SPIE: Multimedia systems and applications, vol. 3528, Boston, USA, November, 1998, pp. 423-431. |
10 | DeckLink, http://www.blackmagic-design.com/products/decklinkhdextreme. |
11 | ITU-R Recommendation BT.500-7: Methodology for the subjective assessment of the quality of television pictures. |
12 | M. M.Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1997, pp. 680-683. DOI |
13 | T. A. Z. Van Schyndel, R G and C. F. Osborne, "A digital watermark," in Proceedings of IEEE International Conference on Image Processing, vol. 2, November 1994, pp. 86-90. DOI |
14 | R. Wolfgang and E. Delp, "A watermark for digital images," in Proceedings of IEEE International Conference on Image Processing, vol. 3, September 1996, pp. 219-222. DOI |
15 | P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no. 10, October 2001, pp. 1593-1601. DOI ScienceOn |
16 | J. Fridrich, M. G. and Arnold C.Baldoza, "New fragile authentication watermark for images," in Proceedings of IEEE International Conference on Image Processing, September 2000, pp. 446-449. DOI |