1 |
M. Hirokawa, and J. Iijima, "A study on digital watermarking usage in the mobile marketing field: cases in Japan," in Proceedings of IEEE Symposium on Logistics and Industrial Informatics, Linz: Austria, pp. 1-6, Sept. 2009.
|
2 |
T. Nakamura, A. Katayama, M. Yamamuro, and N. Sonehara, "Fast watermark detection scheme for camera-equipped cellular phone," in Proceedings of ACM Conference on Mobile and Ubiquitous Multimedia, New York: NY, pp. 101-108, Oct. 2004.
|
3 |
A. Pramil, A. Keskinarkaus, and T. Seppanen, "Toward an interactive poster using digital watermarking and a mobile phone camera," Signal, Image and Video Processing, Vol. 6, No. 2, pp. 211-222, 2012.
DOI
|
4 |
R. C. Gonzalez, and R. E. Woods, Digital Image Processing, Addison-Wesley Pub., ch. 3, pp. 120-128, 1992.
|
5 |
K. Zhang., A. Cuesta-Infane, L. Xu., and K. Veermachaneni., "SteganoGAN: high capacity image steganography with GANs," ArXiv, 2019. Available: https://arxiv.org/abs/1901.03892
|
6 |
J. Liu, Y. Ke, and X. Yang, "Recent advances of image steganography with generative adversarial networks," IEEE Access, Vol. 8, pp. 60575-60579, 2020.
DOI
|
7 |
M. Tancik, B. Mildenhall., and R. Ng., "Stegastamp: invisible hyperlinks in physical photographs", in Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Seattle: WA, pp. 2117-2126, June 2020.
|
8 |
D. He, and Q. Sun, "A practical print-scan resilient watermarking scheme," in Proceedings of IEEE Conference on Image Processing, Genova: Italy, pp. 257, Sept. 2005.
|
9 |
A. Poljicak, L. Mandic, and D. Agic, "Discrete fourier transform-based watermarking method with an optimal implementation radius," Journal of Electronic Imaging, Vol. 20, No. 3, pp. 033008-1-033008-8, 2011.
DOI
|