1 |
배성호, 이경환, "다중 히스토그램 쉬프팅을 이용한 리버서블 워터마킹," 한국화상학회지, 제14권, 제3호, pp. 194-200, 2008.
|
2 |
I. J. Cox, Joe Kilian, F. T. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, Vol.6, No.12, pp.1673-1687, 1997.
DOI
ScienceOn
|
3 |
A Nikolaidis and I. Pitas, "Region-based Image Watermrking," IEEE Trans. on Image Processing, Vol. 10, No.11, pp. 1726-1740, 2001.
DOI
ScienceOn
|
4 |
H. C. Huang, F. H. Wang and J. S. Pan, "Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization," IEICE Trans. Fund , Vol.E85-A, No.7, pp.1719-1726, 2002.
|
5 |
Z. M. Lu, D. G. Xu and S. H. Sun, "A VQ-based Robust Multi- watermarking Algorithm," IEEE Trans. on Image Processing, Vol.14, No.6, pp. 822-831, 2005.
DOI
|
6 |
황진하, 김종원, 최종욱, "개선된 히스토그램 쉬프팅 기법을 이용한 리버서블 워터마킹," 한국정보처리학회 논문지, 제14-C권, 제1호, pp. 39-44, 2007.
과학기술학회마을
|
7 |
Sang-Kwang Lee, Young-Ho Suh, and Yo-Sung Ho, "Reversible Image Authentication Based on Watermarking," Multimedia and Expo 2006 IEEE International Conference, pp. 1321-1324, 2006.
|
8 |
J. Tian, "Reversible Data Embedding Using a Difference Expansion," IEEE Trans. on Circuits Systems and Video Technology, Vol.13, No.8, pp. 890-896, 2003.
DOI
ScienceOn
|
9 |
J. Fridrich, M. Goljan, and R Du, "Invertible Authentication," Proc. SPIE, Security and Watermarking of Multimedia Contents, pp. 197-208. 2001.
|
10 |
William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 2005.
|