|
[1]陳柏如 (2002), “數位時式著作權集體管理之研究” ,國立台灣大學法律學研究所碩士論文。 [2]李遠坤、陳玲惠 (1999), “數位影像之資訊隱藏技術探討”,資訊安全通訊,第五卷,第四期,第18-30頁。 [3]張真誠、陸哲明、呂慈純 (2007), “多媒體安全技術” ,全華。 [4]A. M. Alattar(2003), “Reversible Watermark Using Difference Expansion of Triplets,” Proc. IEEE Int. Conf. Image Processing, Vol. 1, pp. 501-504. [5]A. M. Alattar(2004), “Reversible Watermark Using Difference Expansion of Quads,” Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 3, pp. 377-380. [6]A. M. Alattar(2004), “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Trans. Image Processing, Vol. 13, no. 8, pp. 1147-1156. [7]Z. Baharav, D. Shaked(1999), “Watermarking of Dither Halftone Images,” Hewlett-Packard Labs Tech Rep, HPL-98-32. [8]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber(2002), “Reversible Data Hiding,” Proc. Int. Conf. Image Processing, pp.157-160. [9]M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber(2005), “Lossless Generalized-LSB Data Embedding,” IEEE Trans. Image Processing, Vol. 14, no. 2, pp. 253-265. [10]C. C. Chang and H. W. Tseng(2004), “VQ-based Image Watermarking Using Anti-Gray Coding,” Informatica, Vol. 15, no. 2, pp. 147-160. [11]C. C. Cheng, W. L. Tai, and M. H. Lin(2005), “A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization,” Proc. Int. Conf. Advanced Information Networking and Application, Vol. 1, pp. 947-952. [12]R. W. Floyd, L. Steinberg (1976), “An Adaptive Algorithm for Spatial Grayscale,” Proceedings of Society for Information Display, Vol. 17(2), pp. 75-77. [13]J. Fridrich, M. Goljan, and R. Du(2001), “Distortion-free Data Embedding for Images,” Proc. 4th Workshop Information Hiding, Vol. 2137, pp. 27-41. [14]J. Fridrich, M. Goljan, and R. Du(2001), “Invertible Authentication,” Proc. SPIE, Security and Watermarking of Multimedia Contents III, Vol. 3971, pp. 197-208. [15]J. Fridrich, M. Goljan, and R. Du(2001), “Invertible Authentication Watermark for JPEG Images,” Proc. Int. Conf. Information Technology: Coding and Computing, pp. 223-227. [16]J. Fridrich, M. Goljan, and R. Du(2002), “Lossless Data Embedding-New Paradigm in Digital Watermarking,” EURASIP J. Appl. Siginal Processing, Vol. 2002, no. 2, pp. 185-196. [17]J. Fridrich, M. Goljan, and R. Du(2002), “Lossless Data Embedding for All Image Formats,” Proc. SPIE Security and Watermarking of Multimedia Contents IV, Vol. 4675, pp. 572-583. [18]C. W. Honsinger, P. Jones, M. Rabbani, and J. C. Stoffel(1999), “Lossless recovery of an original image containing embedded data,” US Patent Application, no. US6278791. [19]H. C. Huang, F. H. Wang, and J. S. Pan(2002), “A VQ-based Robust Multi-Watermarking Algorithm,” IEICE Trans. Fund., Vol. E85-A, no. 7, pp. 1719-1726. [20]L. Kamstra and Henk J. A. M. Heijmans(2005), “Reversible Data Embedding Into Images Using Wavelet Techniques and Sorting,” IEEE Trans. Image Processing, Vol. 14, no. 12, pp. 2082-2090. [21]A. Leest, M. Veen, and F. Bruekers(2003), “Reversible Image Watermarking,” Proc. IEEE Int. Conf. Image Processing, Vol. 2, pp. 731-734. [22]Wei Lu, Hongtao Lu, Fu-Lai Chung(2006), “Robust digital image watermarking based on subsampling,” Applied Mathematics and Computation, Vol. 181, pp. 354-362. [23]P. S. Liao, J. S. Pan, Y. H. Chen, B. Y. Lioa(2005), “A Lossless Watermarking Technique for Halftone Images,” International Workshop on Intelligent Information Hiding and Multimedia Signal Processing, pp.593-599. [24]Der-Chyuan Lou, Hao-Kuan Tso, Jiang-Lung Liu(2007), “A copyright protection scheme for digital images using visual cryptography technique,” Computer Standards & Interfaces, Vol. 29, pp. 125-131. [25]Z. Ni, Y. Q. Shi, N. Ansari and W. Su(2006), “Reversible Data Hiding,” IEEE Trans. Circuits Syst. Video Technol., Vol. 16, no. 3, pp. 354-362. [26]F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn(1999), “Information Hiding – A Survey,” Proceedings of the IEEE, Vol. 87, no. 7, pp. 1062-1078. [27]D. M. Thodi and J. J. Rodrigues(2004), “Reversible Watermarking by Prediction-Error Expansion,” Proc. 6th IEEE Southwest Symposium Image Analysis and Interpretation, Vol. 3, pp.21-25. [28]J. Tian and R. O. Wells(2004), ”Reversible Data-Embedding with a Hierarchical Structure,” Proc. ICIP Int. Conf. Image Processing, Vol. 5, pp. 3419-3422. [29]J. Tian(2002), “Wavelet-based Reversible Watermarking for Authentication,” Proc. SPIE Security and Watermarking of Multimedia Contents IV, Vol. 4675, pp. 679-690. [30] Ming Sun Fu, Oscar C. Au(2002) “Data Hiding Watermarking for Halftone Images,” IEEE Transactions on Image Processing, Vol.11, no.4, pp. 477-484. [31] Ming Sun Fu, Oscar C. Au(2001), “Improved Halftone Image Data Hiding with Intensity Selection” IEEE Transactions on Image Processing, Vol.5, no.4, pp. 243-246. [32] Ming Sun Fu, Oscar C. Au(2004), “Correlation-based Watermarking for Halftone Images” Proceedings of the 2004 International Symposium on Circuits and Systems, Vol. 2, pp. 21-24. [33]Ming Sun Fu, Oscar C. Au(2003) , “A Novel Method to embed Watermark in Different Halftone Images: Data Hiding by Conjugate Error Diffusion(DHCED)” IEEE International Conference on ICASSP, Vol. 3, pp. 529-532. [34]J. S. Pan, H. Luo, Z. M. Lu(2006), “A Lossless Watermarking Scheme for Halftone Image Authentication,” International Journal of Computer Science and Network Security, Vol. 6, no.2B , pp.147-151. [35]F.A.P. Petitcolas, R. J. Anderson and M. G. Kuhn(1999), “Information hiding-a survey,” proceedings of the IEEE, Vol87, no.7, pp.1062-1078. [36]K. J. Sankar, V. M. Pandharipande, P. S. Moharir(2004), “Generalized Gray codes,” Intelligent Signal Processing and Communication Systems, pp. 654-659. [37]J. Tian(2003), “High Capacity Reversible Data Embedding and Content Authentication,” Proc. IEEE Int. Conf. Acoustics, Speech, and signal Processing, Vol. 3, pp. III-570-20. [38]J. Tian(2003), “Reversible Data Embedding Using a Difference Expansion,” IEEE Trans. Circuits Syst. and Video Technol., Vol. 13, no. 8, pp. 890–896. [39]R. Ulichney(1987), “Digital Halftoning,” MIT Press, Cambridge, MA. [40]C. De. Vleeschouwer, J. F. Delaigle, and B. Macq(2001), “Circular Interpretation of Histogram for Reversible Watermarking,” Proc. IEEE 4th Workshop Multimedia Signal Processing, pp. 345-350. [41]C. De. Vleeschouwer, J. F. Delaigle, and B. Macq(2003), “Circular Interpretation of Bijective Transformations in Lossless Watermarking for Media Asset Management,” IEEE Trans. Multimedia, Vol. 5, no. 1, pp. 97–105. [42]G. Xuan, C. Yang, Y. Zhen, Yun Q. Shi, Z. Ni(2004), “Reversible Data Hiding based on Wavelet Spread Spectrum,” IEEE Workshop Multimedia Signal processing, pp. 211-214. [43]B. Yang, M. Schmucker, C. Busch, X. Niu, and S. Sun(2004), “Approaching Optimal Value Expansion for Reversible Watermarking,” Proc. 7th Workshops Multimedia and Security, pp. 95-102. [44]B. Yang, M. Schmucker, W. Funk, C. Busch, and S. Sun(2004), “Integer DCT-based Reversible Watermarking for Images Using Companding Technique,” Proc. SPIE, Vol. 5306, pp. 405-415. [45]B. Yang, M. Schmucker, X. Niu, C. Busch, and S. Sun(2004), “Reversible Image Watermarking by Histogram Modification for Integer DCT Coefficients,” Proc. IEEE 6th Workshop Multimedia Signal Processing, pp. 143-146.
|