1 |
Alexander H. paquet, Rabab K. Ward, 'Wavelet-Based Digital Watermarking For Image Authentication,' IEEE CCECE, Vol.2, pp.879-884, May, 2002
DOI
|
2 |
E. T. Lin, C. I. Podilchuk, and E. J. Delp, 'Detection of image alterations using semi-fragile watermarks,' Proceedings of the SPIE International Conf. Vol.3971, January, 2000
DOI
|
3 |
J. Fridrich, 'Security of Fragile Authentication Watermarks with Localization,' Proc. SPIE, Vol.4675, pp.691-700, January, 2002
DOI
|
4 |
D. Kunder, D. Hatzinakos, 'Digital Watermarking for Telltale Tamper Proofing and Authentication,' IEEE Proceedings. Vol.87, pp.1167-1180, July, 1999
DOI
ScienceOn
|
5 |
Han Ho Koh, and Sang Ju Park, 'Semi-Fragile Watermarking for Telltale Tamper Proofing and Authenticating,' Proc. of ITC-CSCC 2002, Vol.1 No.1, pp.623-626, July, 2002
과학기술학회마을
|
6 |
Yi-Ta Wu, Frank Y. Shih, 'An adjusted-purpose digital watermarking technique,' Pattern Recognition, Vol.37, No.12, pp.2349-2359, Dec., 2004
DOI
|
7 |
Chi Kin Ho, Chang -Tsun Li, 'Semi-fragile watermarking scheme for authentication of JPEG images,' Proc. ITCC 2004, Vol.1, pp.7-11, Apr., 2004
DOI
|
8 |
Ingemar J. Cox and Joe Kilian, 'Secure Spread Spectrum Watermarking for Multimedia,' IEEE Trans. on Image Processing, Vol.6, No.12, pp.1673-1687, Dec.. 1997
DOI
ScienceOn
|
9 |
A.S. Lewis, G. Knowles, 'Image compression using the 2-D wavelet transform', IEEE Trans. on Image Processing, Vol.1, No.2, pp.244-250, April, 1992
DOI
|
10 |
노상윤, 박상주 'HVS 특성을 이용한 Wavelet 변환 공간에서의 효과적인 워터마킹 기법에 관한 연구' 한국 통신학회 논문지, Vol.27, No.4A, pp.336-334, April, 2002
과학기술학회마을
|
11 |
I. J. Cox, M. L. Miller and J. A. Bloom, 'Watermarking applications and their properties' IEEE Conf. on Information Technology, pp.6-10, 2000
DOI
|
12 |
Gerhard C. Langelaar and Iwan Setyawan, 'Watermarking digital image and video data,' IEEE Signal Processing Magazine, pp.20-46, Sep., 2000
DOI
ScienceOn
|
13 |
B. Coskun, U. Naci, O. Ekici, B. Sankur, 'A Comparative Assessment of Semi-Fragile Watermarking Methods', SPIE Conf. Vol.4518, 2001
|
14 |
J. J. Eggers, J. K. Su, B. Girod, 'A blind watermarking scheme based on structured codebooks,' lEE Conf. Secure Images and Image Authentication, pp.4/1-4/21, 2000
|
15 |
C.Y. Lin, S.F. Chang, 'A Robust image authentication method distinguishing JPEG compression from malicious manipulation', IEEE Transactions on, CSVT Vol.11, No.2, pp.153-168, February, 2001
DOI
ScienceOn
|