References
[1]. Chris Shoemaker, (2002). Hidden Bits: A Survey of
Techniques for Digital Watermarking, Independent Study
Report EER-290, Spring 2002
[2]. Cox, I., Miller, M., and Bloom, J. (2002). Digital
Watermarking: Principles and Practice, Morgan Kaufmann
Publishers, USA, 2002.
[3]. Cox, I.J., Kilian, J., and Leighton, F.T. (1997). “Secure
Spread Spectrum Watermarking for Multimedia”, IEEE Trans.
on Image Processing, Vol. 6, No.12, pp.1673-1687,
December 1997.
[4]. Jiwu Huang, Yun Q. Shi and Yi Shu, (2000). “Embedding
Image Watermark in DC Components”, IEEE Trans. on
Circuits and Systems for Video Technology, Vol. 10, No. 6,
pp.974-979, September 2000.
[5]. Katzenbeisser, S., and Petitcolas, F. (2000). Information
Hiding: Techniques for Steganography and Watermarking,
Artech House Publisher, USA, 2000.
[6]. Kundur, D., and Hatzinakos, D. (1999). “Digital
Watermarking for Telltale Proofing and Authentication”,
Proceedings of the IEEE, Vol. 87, No.7, pp.1167-1180, July
1999.
[7]. Li, C.T. (2004). “Digital fragile watermarking scheme for
authentication of jpeg images”, IEE Proceedings - Vision,
Image, and Signal Processing, Vol. 151, No.6, pp.460-466,
2004.
[8]. Lin, C.Y., and Chang, S.F. (2000). “Semi-Fragile
Watermarking for Authentication JPEG Visual Content”, The
International Society for Optical Engineering Proceedings,
Vol. 3971, pp.140 – 151.
[9]. Memon, N., and Wong, P.W. (1998). Protecting digital
Media Content, Comm. of the ACM, Vol. 41, No.7, July
1998.
[10]. Min-Jen Tsai and Hsiao–Ying Hung, (2005). “Wavelet
Transforms based Digital Watermarking for Image
Authentication” Proceedings of IEEE International
Conference on Computer and Information Science, ACIS
(2005), pp.408-411, 2005.
[11]. Song Yu-jie and Tan Tie-niu, (2003). “A Brief Review on
Fragile Watermarking for Image Authentication”, Journal of
Image and Graphics, Vol. 8 (A), No.1, 2003.
[12]. Swanson, M., Kobayashi, M., and Tewfik, A. (1998).
Multimedia Data-Embedding and watermarking
Technologies, Proc. IEEE, Vol. 86, pp.1064-1087, June.
[13]. Winne, D.A., Knowles, H. D., Bull, D. R. and
Canagarajah, C.N. (2002). “Digital Watermarking in
Wavelet domain with Pre-distortion for Authenticity
Verification and Localization”, Proceedings of the International Society for Optical Engineering, Vol. 4675,
pp.349-356, 2002.
[14]. Xia, X. G., Boncelet, C.G., and Arce, G.R. (1997). “A
Multiresolution Watermark for digital Images”, IEEE (ICIP'97),
Vol. 1, pp.363-368, June 1997.
[15]. Zeng, W., and Liu, B. (1999). “A statistical watermark
detection technique without using original images for resolving rightful ownership of digital images”, IEEE
Transaction on Image Processing, Vol. 8, No.11, pp.1534-
1548, November, 1999.
[16]. Zhu, W., Xiong, Z., and Zhang, Y. Q. (1998).
“Multiresolution watermarking for Images and Video: A
Unified approach”, IEEE (ICIP'98), Vol. 1, October 1998.