1 |
M. Wu and B. Liu, "Watermarking for image authentication," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 437-441.
|
2 |
D. Kundur and D. Hatzinakos, "Towards a telltale watermarking technique for tamper-proofing," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 409-413.
DOI
|
3 |
Liehua Xie and G.R. Arce, "Joint wavelet compression and authentication watermarking," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1998, pp. 427-431.
DOI
|
4 |
TTA KICS.OT-10.0058, "Universal Content Identifier (Standard on Digital Content Identification: Universal Content Identifier)," December 2008.
|
5 |
IETF RFC4179, S Kang, "Using Universal Content Identifier (UCI) as Uniform Resource Names (URN)," http://www.ietf.org/rfc/rfc4179.txt?number=4179), September 2005.
|
6 |
Yoonsik Uhm, Zion Hwang, Minsoo Lee, Jaehoon Nah, Hwangjun Song, and Sehyun Park, "Content Protective Multi-Agent Platform for MsMu Service and Pattern-Based Content Management," ETRI Journal, vol. 32, no. 5, October 2010, pp. 665-675.
DOI
ScienceOn
|
7 |
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Transactions on Image Processing, vol. 6, no. 12, 1997, pp. 1673-1687.
DOI
ScienceOn
|
8 |
Conting service, http://www.conting.co.kr.
|
9 |
M. Kutter, "Watermarking resisting to translation, rotation and scaling", in Proceedings of SPIE: Multimedia systems and applications, vol. 3528, Boston, USA, November, 1998, pp. 423-431.
|
10 |
DeckLink, http://www.blackmagic-design.com/products/decklinkhdextreme.
|
11 |
ITU-R Recommendation BT.500-7: Methodology for the subjective assessment of the quality of television pictures.
|
12 |
M. M.Yeung and F. Mintzer, "An invisible watermarking technique for image verification," in Proceedings of IEEE International Conference on Image Processing, vol. 2, October 1997, pp. 680-683.
DOI
|
13 |
T. A. Z. Van Schyndel, R G and C. F. Osborne, "A digital watermark," in Proceedings of IEEE International Conference on Image Processing, vol. 2, November 1994, pp. 86-90.
DOI
|
14 |
R. Wolfgang and E. Delp, "A watermark for digital images," in Proceedings of IEEE International Conference on Image Processing, vol. 3, September 1996, pp. 219-222.
DOI
|
15 |
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no. 10, October 2001, pp. 1593-1601.
DOI
ScienceOn
|
16 |
J. Fridrich, M. G. and Arnold C.Baldoza, "New fragile authentication watermark for images," in Proceedings of IEEE International Conference on Image Processing, September 2000, pp. 446-449.
DOI
|