1 |
J. A. Bloom, I. J Cox, T. Kalker, J.-P. G. Linnartz, M. L. Miller and C. B. S. Traw, ''Copy protection for DVD video,' Proc. IEEE, vol. 87, no. 7, pp. 1267-1276, July 1999
DOI
ScienceOn
|
2 |
A. De Rosa, M. Bami, V. Cappellini and A. Piva, 'Optimum decoding of non-additive full frame (DFT) watermarks,' in Proc. of the 3rd Int. Work. on Infomation Hiding, Dresden, Germany, Sept. 1999
|
3 |
Boaz Porat, Digital Processing of Random Signals : Theory & Methods, Prentice Hall, 1994
|
4 |
Louis L. Scharf, Statistical Signal Processing : Detection, Estimation, and Time Series Analysis, Addison-Wesley, 1991
|
5 |
김종렬, 문영식, '레벨 적응적 이치화를 이용한 웨이블렛 기반의 디지털 워터마킹,' 전자공학회논문지, 제 37권 CI편, 제 1호, pp. 1-12, 2000년
과학기술학회마을
|
6 |
Edward R. Dougherty, Probabliity and Statistics for the Engineering, Computing and Physical Sciences, Prentice Hall, 1990
|
7 |
Teddy Furon and Pierre Duhamel, 'Robustness of asymmetric watermarking technique,' in Proc. of IEEE Int. Conf. Image Processing, Vancouver, Canada, Sept. 2000
DOI
|
8 |
F. Hartung and M. Kutter, 'Multimedia Watermarking Techni ques,' Proc. of IEEE, Vol.87, No.7, pp.1079-1107, July, 1999
DOI
ScienceOn
|
9 |
D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital media,' IEEE trans. information theory, vol. 44, no. 5, pp. 1897-1905, 1998
DOI
ScienceOn
|
10 |
M. Schneider and S.-F. Chang, 'A robust content based digital signature for image authentication,' in Proc. lEEE Int. Conf. Image Processing, Lausanne, Switzerland, Sept. 1996
DOI
|
11 |
Teddy Furon and Pierre Duhamel, 'An asymmetric public detection watermarking technique,' in Proc. of the 3rd Int. Work. on Information Hidling, Dresden, Germany, Sept. 1999
|