1 |
M. Barni, F. Bartolini, and A. Piva, 'Improved Wavelet-Based Watermarking Through Pixel-Wise Masking,' IEEE Trans. On Image Processing, vol. 10, no. 5, pp, 783-791, May 2001
DOI
ScienceOn
|
2 |
D. Zhao, D. Zhang, W. Gao, 'Embedded Image Coding Based on Hierarchical Discrete Cosine Transform,' Journal of Software, vol.12, vo.9, pp. 1287-1294, September 2001
|
3 |
K. Su, D. Kundur and D. Hatzinakos, 'A Novel Approach to Collusion-resistant Video Watermarking,' Proceedings of the SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 491-502, January 2002
DOI
|
4 |
M. G. Chung, H. Kim, and M. H. Song, 'A scene boundary detection method,' Proceedings of IEEE Iinternational Conference On Image Processing, pp. 933-936, 2000
DOI
|
5 |
G.C. Langelaar, I. Setyawan and R. L. Lagendijk, 'Watermarking Digital Image and Video Data A State-of-the-Art Overviw,' IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, September 20000
DOI
ScienceOn
|
6 |
M.D. Swanson, M. Kobayashi and A. H. Tewfik, 'Multimedia Data-Embedding and Watermarking Technologies,' Proceedings of The IEEE, vol. 86, no. 6, pp, 1064-1087, June 1998
DOI
ScienceOn
|
7 |
F. Hartung and M. Kutter, 'Multimedia Watermarking Techni ques,' Proc. of IEEE, Vol.87, No.7, pp.1079-1107, July, 1999
DOI
ScienceOn
|
8 |
S. P. Mohanty, K. R. Ramakrishnan and M. S. Kankanhalli, 'A DCT Domain Visible Watermarking Technique for Images,' International Conference On Multimedia and Expo, vol. 12, pp. 1029-1032, July 2000
DOI
|
9 |
P. W. Wong, N. Memon, 'Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification,' IEEE Trans. On Image Processing, vol. 10, no. 10, pp. 1593-1601, October 2001
DOI
ScienceOn
|
10 |
C. I. Podilchuk and W. Zeng, 'Image-Adaptive Watermarking Using Visual Models,' IEEE Journal On Selected Areas in Communications, vol. 16, no. 4, pp. 525-539, May 1998
DOI
ScienceOn
|
11 |
C. D. Vleeschouwer, J. F. Delaigle and B. Macq, 'Invisibility and Application Functionalities in Perceptual Watermarking-A Overview,' Proceedings of The IEEE, vol. 90, no. 1, pp. 64-77, January 2002
DOI
ScienceOn
|
12 |
S. Craver, N. Memon, B. L. Yeo and M. M. Yeung, 'Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications,' IEEE Journal on Selected Areas in Communications, vol. 16, no 4, pp. 573-586, May 1998
DOI
ScienceOn
|