1 |
M.D. Swanson, B. Zhu, and A.H. Tewfik, "Multiresolution Scene-Based Cideo Water- Marking using Perceptual Models," IEEE J ournal on Selected Areas in Communications, Vol. 16, Issue 4, pp. 540-550, 1998.
DOI
|
2 |
C.V. Serdean, M.A. Ambroze, M. Tomlinson, and J.G. Wade, "DWT-based High-capacity Blind Video Watermarking, Invariant to Geometrical Attacks," IEEE Proc. Vision, Image and Signal Processing, Vol. 150, Issue 1, pp. 51-58, 2003.
DOI
|
3 |
Y. Wang and Al. Pearmain, "Blind MPEG-2 Video Watermarking Robust Against Geometric Attacks: A Set of Approaches in DCT Domain," IEEE Trans. on Image Processing, Vol. 15, No. 6, pp. 1536-1543, 2006.
DOI
|
4 |
Jing Zhang, Anthony T.S. Ho, Gang Qiu, and Pina Marziliano, "Robust Video Watermarking of H.264/AVC," IEEE Trans. Circuits Sys. Video Tech., Vol. 54, No. 2, pp. 205-209, 2007.
|
5 |
윤지선, 이석환, 송윤철, 장봉주, 권기룡, 김민환, "MPEG-4 스케일러블 비디오 코딩 및 멀티미디어 트랜스코딩에 강인한 블라인드 비디오 워터마킹," 멀티미디어학회논문지, 제11권, 10호, pp. 1347-1358, 2008.
과학기술학회마을
|
6 |
A.M. Alattar, "Reversible Watermark using the Difference Expansion of A Generalized Integer Transform," IEEE Trans. Image Process., Vol. 13, No. 8, pp. 1147-1156, 2004.
DOI
|
7 |
B. Yang, M. Schmucker, C. Busch, X. Niu, and S. Sun, "Approaching Optimal Value Expansion for Reversible Watermarking," Proc. of the 7-th Workshops on Multi- media and Security, pp. 95-102, 2004.
|
8 |
B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun, "Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients," Proc. of the IEEE 6th Workshop on Multimedia Signal Processing, pp. 143-146, 2004.
|
9 |
J.M. Zain, L.P. Baldwin, and M. Clarke, "Reversible Watermarking for Authentication of Dicom Images," Proc. of the 26th Annual International Conference of the Engineering in Medicine and Biology Society, pp. 3237-3240, 2004.
|
10 |
Xiao Zeng, Zhen-Yong Chen, Ming Chen, and Zhang Xiong, "Reversible Video Watermarking using Motion Estimation and Prediction error expansion," Journal of Information Science and Engineering, Vol. 27, pp 465-479, 2011.
|
11 |
Zhenyong Chen, Zhang Xiong, and Long Tang, "A Novel Scrambling Scheme for Digital Video Encryption," Proc. of Pacific-Rim Symposium on Image and Video Technology (PSIVT) , pp. 997-1006, 2006.
|
12 |
Zheng Liu and Xue Li, "Motion Vector Encryption in Multimedia Streaming," Proc. of 10Th international Conference of Multimedia Modelling Conference, pp. 64-71, 2004.
|
13 |
B. Furht and D. Kirovski, Multimedia Security Handbook, CRC Press LLC, 2004.
|
14 |
C. Shi and Bharat Bhargava, "A Fast MPEG Video Encryption Algorithm," Proc. of ACM Multimedia, pp. 81-88, 1998.
|
15 |
A. Shamir, "How to share a secret," Proc. of Communications of the ACM, Vol. 2, pp. 612-613, 1979.
|
16 |
Coding of audio-visual objects-Part 2: Visual, ISO/ IEC 14492-2 (MPEG-4 Visual) , ISO/IEC JTC 1, Version 1: 1999, Version 2: 2000, Version 3: 2004.
|
17 |
Advanced Video Coding for Generic Audiovisual Services, ITU-T Rec. H.264 and ISO/ IEC 14496-10 (MPEG-4 AVC) , ITU-T and ISO/ IEC JTC-1, Version 1: 2003, Version 2: 2004, Version 3: 2005, Version 4: 2005,Version 5 and Version 6: 2006, Version 7: 2007.
|
18 |
Jan Bormans and Keith Hill, MPEG-21 Overview v.5, ISO/IEC JTC1/SC29/WG11/N5231, 2002,
|
19 |
H. Schwarz, D. Marpe, and T Wiegand, "Overview of the Scalable Video Coding Extension of the H.264/AVC Standard," IEEE Trns. on Circuits and Systems for Video Technology, Vol. 17, pp. 1103-1120, 2007.
DOI
ScienceOn
|
20 |
http://www.bbc.co.uk/opensource/projects/dirac/, 2011.
|
21 |
http://www.xvid.org/, 2011.
|
22 |
Anthony Vetro, "Transcoding Scalable Coding and Standardized Metadata," 8th International Workshop of Visual Content Processing and Representation, Vol. 2849, pp. 15-16, 2003.
|
23 |
장봉주, 이석환, 권기룡, "생물학적 바이러스를 이용한 비디오 콘텐츠의 전염성 정보은닉 시스템 모델링," 전자공학회논문지, 제49권 CI 3호, pp. 34-45, 2012.
과학기술학회마을
|