F. Hartung, B. Girod, Digital watermarking of raw and compressed video, SPIE, 2952, 1996,205-213.[2]B.M. Macq, J. I. Quisquater, Cryptology for digital TV broadcasting, Proc. IEEE, 1995, 83(6),944-957.[3]G. Voyatzis, I. Pitas, The use of watermarks in the protection of digital multimedia products,Proc. IEEE, 1999, 87(7), 1197-1207.[4]R.G. Van Schyndel, A. Z. Tirkel, C. F. Osborne, A digital watermarks, In.[J].IEEE Int. Conf. on Image Processing, Piscataway, New Jersey.1994,2:86-90[5]D.J. Fleet, Embedding invisible information in color images, In: IEEE Int. Conf. on Image Processing, Piscataway, New Jersey, 1997, 1, 532-535.[6]I.J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1673-1687.[7]M.D. Swanson, M. Kobayashi, A. H. Tewfik, Multiresolution data embedding and watermarking technologies, Proc. IEEE, 1998, 86(6), 1064-1087.[8]钮心忻,杨义先,基于小波变换的数字水印隐藏与检测算法,计算机学报,2000,23(1),21-27.[9]M. Barni, F. Bartolini, V. Cappellini, A. Piva, A DCT-domain system for robust image watermarking, Signal Processing, 1998, 66(3), 357-372.[10]A. Piva, M. Barni, F. Bartolini, V. Cappellini, DCT-based watermark recovering without resorting to the uncorrupted original image, In: IEEE Int. Conf. on Image Processing, Santa Barbra,California, 1997, 1, 520-523.[11]李华,朱光喜,朱耀庭,一种基于人眼视觉感知模型的数字水印隐藏方法,电子学报,2000,28(10),111-114.[12]J. Johnston, N. Jayant, R. Safranek, Signal compression based on models of human perception,Proc. IEEE, 1993, 81(10), 518-526.[13]L. Torres, M. Kunt, Video Coding, The Second Generation Approach, Boston Hardbound, Kluwer Academic Publishers, 1995, 57-102.[14]S. Mallat, A theory of multiresolution signal decomposition: The wavelet representation, IEEE Trans. on PAMI, 1989, 11(7), 674-693.
|