1 |
F. Mintzer, J. Lotspiech, and N. Morimoto, "Safeguarding digital library contents and users: digital watermarking," D-Lib Magazine, 1997.
|
2 |
A. Shiozaki, M. Iwata, and A. Ogihara, "Reversible Watermarking Method for JPEG Image," IEICE Trans. on Information and Systems, Vol.E91-D, No.7, pp.2068-2071, 2008.
DOI
ScienceOn
|
3 |
X. Wang, J. Wang, and H. Peng, "A Semi-fragile Image Watermarking Resisting to JPEG Compression," Proc. of the International Conference on Management of e-Commerce and e-Government, pp.498-502, 2009.
|
4 |
H. Wang and C. Liao, "Compressed-domain fragile watermarking scheme for distinguishing tampers on image content or watermark", Proc. of the International Conference on Communications, Circuits and Systems, pp.480-484, 2009.
|
5 |
R. Caldelli, F. Filippini, and R. Becarelli, "Reversible Watermarking Techniques: An Overview and a Classification," EURASIP Journal on Information Security, Vol.2010, Article ID. 134546, 2010.
|
6 |
M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, "Lossless generalized-LSB data embedding," IEEE Trans. on Image Processing, Vol.14, No.2, pp.253-266, 2005.
DOI
ScienceOn
|
7 |
S. Lee, C. D. Yoo, and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Trans. on Information Forensics and Security, Vol.2, No.3, pp.321-330, 2007.
DOI
ScienceOn
|
8 |
최학남, 김종원, 최종욱, 김학일, "JPEG 압축 영역에서의 리버 서블 워터마킹", 정보처리학회논문지, Vol.17, pp.121-130, 2007.
|
9 |
여동규, 이해연, "차이값 히스토그램 기반 가역 워터마킹을 이용한 블록 단위 영상 인증 알고리즘", 정보처리학회논문지, Vol.18-B, No.6, 2011.
|
10 |
I. J. Cox, M. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Morgan Kaufmann Publishers Inc., San Francisco, CA, 2007.
|
11 |
P. H. W. Wong, C. Andy, and O. C. Au, "On improving the iterative watermark embedding technique for JPEG-to-JPEG watermarking," Proc. of the International Symposium on Circuits and Systems, pp.161-164, 2004.
|
12 |
X. Shi, F. Liu, D. Gong, and J. Jing, "An Authentication Watermark Algorithm for JPEG images," Proc. of the International Conference on Availability, Reliability and Security, pp.584-588, 2009.
|
13 |
P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, Vol.38, No.12, pp.2519-2529, Dec., 2005.
DOI
ScienceOn
|
14 |
X. Q. Zhou, H. K. Huang, and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Trans. Medical Imaging, Vol.20, No.8, pp.784-791, Aug., 2001.
DOI
ScienceOn
|
15 |
A. U. Rajendra, D. Anand, B. P. Subbanna, and U. C. Niranjan, "Compact storage of medical images with patient information," IEEE Trans. Information Technology in Biomedicine, Vol.5, No.4, pp.320-323, Dec., 2001.
DOI
ScienceOn
|
16 |
강태환, 장호현, 김동서, 주낙근, "이미지 인증과 변형 검출을 위한 DWT기반 다중워터마킹," 한국콘텐츠학회 2005 추계종합 학술대회 논문집, Vol.3, No.2, pp.480-484, 2005.
|
17 |
김효철, "히스토그램 보정을 이용한 고신뢰성 영상 인증 기법," Journal of Korea Multimedia Society, Vol.13, No.7, pp.1088-1094, July, 2010.
|
18 |
S. Emmanuel, H. C. Kiang, and A. Das, "A Reversible Watermarking Scheme for JPEG-2000 Compressed Images," Proc. of the IEEE International Conference on Multimedia and Expo, pp.69-72, 2005.
|
19 |
J. M. Zain and M. Clarke, "Reversible Watermarking Surviving JPEG Compression," Proc. of the International Conference of IEEE Engineering in Medicine and Biology Society, Vol.4, pp.3759-3762, 2005.
|