1 |
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' IEEE Trans. Image Processing, vol. 6, pp. 1673-1687, Dec. 1997
DOI
ScienceOn
|
2 |
유저연, 유지상, 김동욱, 김대경, '특이치 분해를 이용한 비가시적 워터마크 기법', 한국통신학회논문지, 제 28권 11C호, pp. 1118-1122, 2003년 11월
|
3 |
A. Piva, M. Barni, F. Bartolini, and V. Cappellini, 'DCT-based watermark recovering without resorting to the uncorrupted original images,' in Proc. Int. Conf. Image Processing 97, vol. I, pp. 520-523, Santa Barbara, CA, USA, Oct. 1997
DOI
|
4 |
C.D. Vleeschouwer, J. Delaigle, and B. Macq, 'Invisibility and application functionalities in perceptual watermarking An overview,' 0Proc. IEEE, vol. 90, pp. 64-77, Jan. 2002
DOI
ScienceOn
|
5 |
B. Chitprasert and K. R. Rao, 'Human visual weighted progressive image transmission,' IEEE Trans. Commun., vol. 38, pp. 1040-1044, July 1990
DOI
ScienceOn
|
6 |
Matt L. Miller, Gwenael J. Doerr, and Ingmar J. Cox, 'Applying informed coding and embedding to design a robust high-capacity watermark,' IEEE Trans. Image Processing, vol. 13, no. 2, pp. 792-807, Jun. 2004
DOI
ScienceOn
|
7 |
Chuhong Fei, Deepa Kundur, and Raymong H. Kwong, 'Analysis and design of watermarking algorithms for improved resistance to compression,' IEEE Trans. Image Processing, vol. 13, no. 2, pp. 126-144, Feb. 2004
DOI
ScienceOn
|