1 |
W. Bender, D. Gruhl, and N. Morimoto, 'Techniques for Data Hiding,' Proc. SPIE, Storage and Retrieval for Image and Video Database III, 2420, 164-173, Feb. 1995
|
2 |
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shammon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. Image Processing, 6, 1673-1686, Dec. 1997
DOI
ScienceOn
|
3 |
고성식, 조강석, '음성로고 삽입을 위한 디지털 영상 워터마킹에 관한 연구,' 대한전자공학회 논문지, 39 (3), 21-27, Sep. 2002
|
4 |
R. G. van Schyndel, A. Z. Tirkel and C. F. Osborne, 'A Digital Watermark,' Proc. IEEE Int. Conf. Image Processing, 2, 86-90, Nov. 1994
|
5 |
M. Barni, F. Bartolini, V. Cappellini, A. Lippi. And A. Piva, 'A DWT-based Technique for Spatio-frequency Masking of Digital Signatures,' Proc. SPIE/IS&T Int. Conf. Security Watermarking Multimedia Contents, 3657, Jan. 1999
|
6 |
D. Kundur and D. Hatzinakos, 'Digital Watermarking using Multiresolution Wavelet Decomposition,' Proc. IEEE. Int. Conf. Acoustics, Speech, Signal Processing, 5, 2969-2972, May 1998
|
7 |
ITU-T, 'Method for subjective determination of transmission quality', Rec. P.800, Aug 1996
|
8 |
A. Piva, M. Barni, F. Bartolini, and B. Cappellini, 'DCT-based Watermark Recovering Without Resorting to the Uncorrupted Original Image,' Proc. IEEE Int. Conf. Image Processing, 520-523, Oct. 1997
|