1 |
Proceedings of the IEEE International Conference on Image Processing 1997, 1998
|
2 |
N. Memon, P.W.Wong, "Protecting Digital Media Content," Comm. of the ACM, Vol.41, No.7, pp.35-43, 1998
DOI
|
3 |
M.D.Swanson, M. Kobayashi and A. H. Tewfik, "Multimedia Data-Embedding and Watermarking Technologies," Proc. of the IEEE, Vol. 86, No.6, pp.1064-1087, 1998
DOI
ScienceOn
|
4 |
R. Anderson Ed., "Information Hiding," in Lecture Notes in Computer Science, Vol.1147, Springer, 1996
|
5 |
R.Anderson and F.A.P.Petitcolas, "On the Limits of Stegangoraphy," IEEE JSAC, Vol. 41, No.7, pp.474-481, 1998
|
6 |
松井甲子雄, "電子透かしの基礎", 森北出版株式會社, 1998(in Japanese)
|
7 |
W. Bender, D. Gruhl, N.Morimoto and A Lu, "Techniques for Data Hiding," IBM Syst. J., Vol. 35, pp.313-336, 1996
DOI
|
8 |
N. Nikolaidis, I. Pitas, "Copyright Protection of Images Using Robust Image Signature," In proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE Press, pp.2168-2171, 1996
|
9 |
C. I. Podilchuk, W.Zeng, "Image-Adaptive Watermarking Using Visual Models," IEEE JSAC, Vol.16, No.4, pp.525-539, 1998
|
10 |
류지열, "미세 피치 칩 온 필름의 결함 검출을 위한 자동시스템 개발", 한국정보기술학회 논문지, 제9권, 제1호, pp.25-34, 2011 1월
|