1 |
G. Voyatzis, N. Nikolaidis and I. Pitas, 'Digital Watermarking : An Overview,' Proc, of EUSIPCO'98, Sep., 8-11, Rhodes, Greece, 1998
|
2 |
S. Craver, N. Memon, N. Yeo, and M. Yeung, 'Can Invisible Watermarks Resolve Rightful Ownership?,' IBM Research Report, RC20509, July 25, 1996
|
3 |
R. B. Wolfgang, E. J. Delp, 'A watermarking technique for digital imagery : further studies,' Video and Imaging Processing Laboratory, Proceeding of the International Conf. on Imaging Science, pp.279-287, 1997
|
4 |
I. J. Cox, M. L. Miller, 'A Review of Watermarking and the Importance of Perceptual Modeling,' Proc. SPIE Conf. on Human Vision Electronic Imaging II, Vol. 3-16, pp. 92-99, Feb., 1997
|
5 |
A. Piva, M. Barni, F. Bartolini, V. Cappellini, 'DCT-based watermark recovering without resorting to the uncorrupted original image,' Proceedings of ICIP'97, Santa Barbara, CA, SA, Oct., 26-29, Vol. I, pp. 520-523, 1997
DOI
|
6 |
I. J. Cox, J. Kilian, T. Leighton and T. Shamoon, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, 6, 12, pp. 1673-1687, 1997
DOI
ScienceOn
|
7 |
J. J. K. O' Ruanaidh, W. J. Dowling, F. M. Boland, 'Phase watermarking of digital images,' Proc. 1996 IEEE Int. Conference on Image Processing(ICIP'96), Vol. III, pp. 239-242, 1996
DOI
|
8 |
W. Bender, D. Gruhl, N. Morimoto, and A. Lu, 'Techniques for data hiding', IBM Systems Journal, Vol. 35, No. 3 and 4, pp.313-336, 1996
DOI
|
9 |
I. Pitas and T. H. Kaskalis, 'Applying signatures on digital images,' in Porc. IEEE Nonlinear Signal and Image Processing, June 1995, pp. 460-463
|
10 |
G. Caronni, 'Assuring Ownership Rights for Digital Images,'in Reliable IT Systems VIS '95, H. H. Brueggemann and W. Gerhardt-Haeckl, eds.,Vieweg Publishing Company, Germany, 1995
|