1 |
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Second Edition, Morgan Kaufmann Publishers, 2008.
|
2 |
C. Hanqiang, X. Hua, L. Xutao, L. Miao, Y. Sheng, and W. Fang, "A Zero-Watermarking Algorithm Based on DWT and Chaotic Modulation," Proceedings of SPIE, Vol.6247, pp.1-9, 2006(4).
|
3 |
J. Sang, X. Liao, and M. S. Alam, "Neural-Network-Based Zero-Watermarking Scheme for Digital Images," Optical Engineering, Vol.45, No.9, pp.097006-1-097006-9, 2006(9).
DOI
ScienceOn
|
4 |
김형도, 박찬권, "무질서한 SMVQ,기반의 제로 워터마킹," 한국콘텐츠학회논문지, 제9권, 제7호, pp.37-44, 2009(7).
과학기술학회마을
DOI
|
5 |
N. Ahmed, T. Natarajan, and K. R. Rao, "Discrete Cosine Transform," IEEE Trans. Computers, Vol.C-23, pp.90-93, 1974(1).
DOI
ScienceOn
|
6 |
Y. H. Ku and X. Sun, "The Chinese Remainder Theorem," Journal of the Franklin Institute, Vol.329, No.1, pp.93-97, 1992(1).
DOI
ScienceOn
|
7 |
http://www.jpeg.org/jpeg/index.html.
|
8 |
J. C. Patra, J. E. Phua, and C. Bornand, "A Novel DCT Domain CRT-Based Watermarking Scheme for Image Authentication Surviving JPEG Compression," Digital Signal Processing, Vol.20, No.6, pp.1597-1611, 2010(10).
DOI
ScienceOn
|
9 |
J. C. Patra, A. Karthik, and C. Bornand, "A Novel CRT-Based Watermarking Technique for Authentication of Multimedia Contents," Digital Signal Processing, Vol.20, No.2, pp.442-453, 2010(3).
DOI
ScienceOn
|