1 |
M.P. Queluz, 'Content-based integrity protection of digital images,' Proc. of SPIE, vol. 3657, Jan, pp. 85-93, 1999
|
2 |
R.B.Wolfgang, J.D.Edward, 'Fragile Watermarking Using VW2D Watermark,' Proc. of SPIE, Vol. 3657, Jan, pp. 204-213, 1999
|
3 |
P.W.Wong, 'A Public Key Watermark for Image Verification and Authentication,' in Proc. IEEE Int. Conf. Image Processing, pp. 425-429, 1998
|
4 |
M.U.Celik, G.Sharma, A.M.Tekalp, E.Saber, 'Localized Lossless Authentication Watermark (LAW),' Proc. of SPIE-IS&T Electronic Imaging, Vol. 5020, pp. 689-698, 2003
|
5 |
William Stallings, Network and Internetwork Security, Prentice Hall, 1995
|
6 |
L. Qian and K. Nahrstedt, 'Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights,' Pre-print, 1998
|
7 |
D.Kundur, D.Hatzinakos, 'A Robust Digital Image Watermarking Method using Wavelet-Based Fusion,' Proc. IEEE ICIP, Santa Barbara, California, Vol.1, pp. 544-547, Oct, 1997
|
8 |
K.S.NG and L.M.CHENG 'Selective block assignment approach for robust digital image watermarking,' Proc. of SPIE, Vol. 3657, Jan, pp. 14-20, 1999
|
9 |
Katzenbeisser, Petitcolas, Information Hiding techniques for steganography and digital watermarking, Artech House, 1999
|
10 |
M.U.Celik, G.Sharma, E.Saber, A.M.Tekalp, 'Hierarchical Watermarking for Secure Image Authentication with Localization,' IEEE Trans. on Image Processing, Vol. 11, No. 6, pp. 585-595, June, 2002
DOI
ScienceOn
|