1 |
C. T. Li, D. C. Lou, and T. H. Chen, "Image Authenticity and Integrity Verification via Content based Watermarks and a Public Key Cryptosystem," in Proc. IEEE Int Conf. Image Processing, vol.3, pp. 694-697, Vancouver, Canada, 2000. DOI:10.1109/ICIP.2000.899549
DOI
|
2 |
Ching-Yung Lin, Shih-Fu Chang, "A Robust Image Authentication Method Distinguishing JPEG Compressing from Malicious Manipulation," IEEE Trans, Circuits and Systems for Video Technology, pp. 153-168, 2001. DOI:10.1109/76.905982
DOI
|
3 |
Michael Arnold, Martin Schmucker, Stephen D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, Arttech House Publishers, Boston, London, 2003.
|
4 |
E. Koch, J. Rindfrey, J. Zhao, "copyright protection for multimedia data," in Proc. Int, Conf. Digital Media and Electronic Publishing, 1994.
|
5 |
I. J. Cox, J. Kilian, T. Leighton, T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. On Image Processing, vol.6, No. 12, pp. 1673-1687, 1997. DOI:10.1109/83.650120
DOI
|
6 |
Jiwu Huang, Yun Q. Shi, "Embedding Strategy for Image Watermarking in DCT Domain," APCC/OECC '99. Fifth Asia-Pacific Conference on. and Fourth Optoelectronics and Communications Conference, pp. 18-22, 1999. DOI:10.1109/APCC.1999.820428
DOI
|
7 |
Jiwu Huang, Yun Q. Shi, Yi Shi, "Embedding Image Watermarks in DC Components," Circuits and Systems for Video Technology, IEEE Transactions on, 2000. DOI:10.1109/76.867936
DOI
|
8 |
Yanling Zhao, Xiaoshi Zheng, Na Li, Guangqi Liu, Qingxi Wang "A Digital Image Watermark Based on DC Coefficients Quantization," 2006 6th World Conference on Intelligent Control and Automation, pp. 9734-9738, 2006. DOI:10.1109/WCICA.2006.1713894
DOI
|