REFERENCES
- [1] Bender W., Gruhl D., Morimoto N. and Lu A., “Techniques for Data Hiding,” IBM System Journal. Vol. 35, No. 3, pp. 313-336 (1996).
- [2] Braudaway G. W., Magerlein K. A. and Mintzer F., “Protecting Publicly-available Images with a Visible Image Watermark,” In the Proceedings of SPIE, Vol. 2659, pp. 126-133(1996).
- [3] Cox I. J., Kiliant J., Leighton T. and Shamoon T., “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transactions on Image Processing, Vol. 6, No. 12, pp. 1673-1687(1997).
- [4] Hsu C. and Wu J., “DCT-Based Watermarking for Video,” IEEE Transactions on Consumer Electronics, Vol. 44, No.1, pp.206-215(1998).
- [5] Hsu C. T. and Wu J. L., “Hidden Digital Watermarks in Images,” IEEE Transactions on Image Processng, Vol. 8, No. 1, Jan, pp. 58-68(1999).
- [6] Hwang M. S., Chang C. C., and Hwang K. F., “A Watermarking Technique Based on One-way Hash Functions,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, pp. 286-294(1999).
- [7] Inoue H., Miyazaki A., Yamamoto A. and Katsura T., “A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E82-A, No. 1, pp.2-10(1999).
- [8] Low S. and Maxemchuk N., “Performance Comparison of Two Text Marking Methods,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.561-572(1998).
- [9] Matsui K., Ohnishi J., and Nakamura Y., “Embedding a Signature to Pictures under Wavelet Transform,” IEICE Transactions, Vol. J79-D-II, No. 6, pp. 1017-1024(1996).
- [10] Naor N. and Shamir A. “Visual Cryptography,” Advances in Cryptology: Eurocrypt’94, Springer-Verlag, Berlin, pp. 1-12(1995).
- [11] Ohbuchi R., Masuda H., and Aono M., “Watermarking Three-Dimensional Polygonal Models Through Geometric and Topological Modifications,” IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp.551-560(1998).
- [12] Ohnishi J. and Matsui K., “Embedding a Seal into a Picture under Orthogonal Wavelet Transform,” The Proceedings of IEEE International Conference on Multimedia Computing and Systems, pp. 514-512(1996).
- [13] O’Ruanaidh J. J. K., Dowling W. J., and Boland F. M., “Watermarking Digital Images for Copyright Protection,” IEE Proceedings-Visual Image Signal Processing, Vol. 143, No. 4, pp. 250-256(1996).
- [14] Swanson M. D., Zhu B. and Tewfik A. H., “Transparent Robust Image Watermarking,” The Proceedings of IEEE International Conference on Image Processing, Vol. 3, pp. 211-214(1996).
- [15] Voyatzis G. and Pitas I. “Applications of Toral Automorphisms in Image Watermarking,” The Proceedings of IEEE International Conference on Image Processing, Vol. 2, pp. 237-240(1996).
- [16] Xia X. G., Boncelet C. G. and Arce G. R., “A Multiresolution Watermark for Digital Images,” The Proceedings of IEEE International Conference on Image Processing, Vol. 1, pp. 548-551(1997).