1 |
Martin Kutter and Sviatoslav Voloshynovskiy and Alexander herrigel, "The watermark copy attack", proceedings of SPIE: Security and watermarking of multimedia content II, Vol. 3971, January 2000
|
2 |
E. T. Lin and E. J. Delp, "A Review of Fragile Image Watermarks," Proceedings of the Multimedia and Security Workshop (ACM Multimedia '99) Multimedia Contents, October 1999, Orlando, pp. 25-29
|
3 |
ISO/IEC JTC1
|
4 |
김성민, 원치선, H.264/AVC의 4X4 DCT 기반 워터마크에 따른 연상 왜곡과 비트율 변화에 따른 연구, 전자공학회 논문집 제 5호, 115쪽, 2005년 9월
|
5 |
Koch, E., J. Rindfrey, and J. Zhao, "Copyright Protection for Multimedia Data", in Proceeding of the International Conference on Digital Media and Electronic Publishing, Leeds, UK, Dec. 1994
|
6 |
S. Saponara, C. Blanch, K. Denolf and J. Bormans, "The JVT Advanced Video Coding Standard : Complexity and performance Analysis on a Tool-by-Tool Basis", Packet Video Workshop (PV'03), 2003
|
7 |
I. J. Cox, M. L. Miller and J. A. Bloom, "Digital Watermarking", Morgan Kaufmann Publishers, 2001
|
8 |
H. S. Victor, W. S. Shim and J. W. Kim, "Real-time MPEG-4 AVC/H.264 CABAC Entropy Coder", IEEE Transaction on Consumer Electronics, Vol 42, No. 4, pp. 255-256, 2005
|
9 |
ITU-T
|
10 |
J.M.G. Linnartz, M. van Dijk "Analysis of Sensitivity attack against electronic Watermark in image" in proceedings of the second international workshop on information hiding vol 1525 of lecture note in Springer, 1998 page 258-272
|
11 |
ISO/IEC JTC 1/SC 29/WG 11, "Dreaft text of final draft international standard for advanced video coding", March 2003
|