王志雄, 王慧琴, 李人厚. 数字水印应用中的攻击和对策综述.通信学报, 2002, 23(11): 75-79.Wang Zhi-xiong, Wang Hui-qin, and Li Ren-hou. Attacks andremedies on application of digital watermarking. Journal onCommunications, 2002, 23(11): 75-79.[2]Chen B and Wornell G W. Quantization index modulationmethods for digital watermarking and informationembedding of multimedia[J].Journal of VLSI Signal ProcessingSystems.2001, 27(1):7-33[3]Cox I J, Kilian J, and Leighton T, et al.. Secure spreadspectrum watermarking for multimedia[J].IEEE Trans. onImage Processing.1997, 6(12):1673-1687[4]Hartung F, Su J K, and Girod B. Spread spectrumwatermarking: malicious attacks and counterattacks.Proceedings of the 1999 Security and Watermarking ofMultimedia Contents, San Jose, CA, USA, Jan 25-27 1999,SPIE Vol. 3657: 147-158.[5]Pereira S, ORuanaidh K J J, and Deguillaume F, et al..Template based recovery of fourier-based watermarks usinglog-polar and log-log maps. IEEE International Conferenceon Multimedia Computing and Systems, Florence, Italy, June7-11 1999, 1: 870-874.[6]康显桂, 黄继武, 林彦等. 抗仿射变换的扩频图像水印算法.电子学报, 2004, 32(1): 8-12.Kang Xian-gui, Huang Ji-wu, and Lin Yan, et al.. Spreadspectrum watermarking resists to affine transformation. ActaElectronica Sinica, 2004, 32(1): 8-12.[7]Deguillaume F, Csurka G, and ORuanaidh J J K, et al..Robust 3D DFT video watermarking. Proceedings of the1999 Security and Watermarking of Multimedia Contents,San Jose, CA, USA, Jan 25-27 1999, SPIE Vol.3657: 113-124.[8]Pereira S and Pun T. Robust template matching for affineresistant image watermarks. IEEE Trans. on ImageProcessing, 2000, 9(6): 1123-1129.[9]Kang X, Huang J, Shi Y Q, and Lin Y. A DWT-DFTcomposite watermarking scheme robust to both affinetransform and JPEG compression[J].IEEE Trans. on Circuitsand Systems for Video Technology.2003, 13(8):776-786[10]Kutter M. Watermarking resistant to translation, rotationand scaling. Proceedings of the 1998 Multimedia Systems andApplications, Boston, MA, USA, Nov 2-4 1998, SPIE Vol.3528: 423-433.[11]Honsinger C and Rabbani M. Data embedding using phasedispersion. Final Program and Proceedings: IS and TsAnnual Conference, Portland, OR, United States, May 26-292000: 264-268.[12]Honsinger C W and Daly S J. Method for detecting rotationand magnification in image.United States, patent 5835639,1998.[13]ORuanaidh J J K and Pun T. Rotation, scale andtranslation invariant spread spectrum digital imagewatermarking[J].Signal Processing.1998, 66(3):303-317[14]Lin C Y, Wu M, and Bloom J A, et al.. Rotation, scale, andtranslation resilient public watermarking for images[J].IEEETrans. on Image Processing.2001, 10(5):755-766[15]孙刚, 谢俊元. 一种基Fourier-Mellin 变换的数字水印的研究.计算机工程, 2004, 30(9): 152-153.Sun Gang and Xie Jun-yuan. Research on a watermark basedon the fourier mellin transform. Computer Engineering, 2004,30(9): 152-153.[16]Zheng D, Zhao J, and Saddik A E. RST invariant digitalimage watermarking based on log-polar mapping and phasecorrelation[J].IEEE Trans. on Circuits and System for VideoTechnology.2003, 13(8):753-765[17]Farzam M and Shirani S. A robust multimedia watermarkingtechnique using zernike transform. 2001 IEEE fourthWorkshop on Multimedia Signal Processing, Cannes, France,Oct 3-5 2001: 529-534.[18]Kim H S and Lee H K. Invariant image watermark usingZernike moments[J].IEEE Trans. on Circuits and Systems forVideo Technology.2003, 13(8):766-775[19]Xin Y Q, Liao S, and Pawlak M. A multibit geometricallyrobust image watermark based on zernike moments.Proceedings of the 17th International Conference on PatternRecognition, Cambridge, United Kingdom, Aug 23-26 2004,4: 861-864.[20]Wu M, Miller M, Bloom J, and Cox I J. A rotation, scale andtranslation resilient public watermark. Security andWatermarking of Multimedia Contents II, San Jose, CA,USA, Jan 24-26 2000, SPIE Vol.3971: 90-98.[21]Simitopoulos D, Koutsonanos D, and Strintzis M G. Robustimage watermarking based on generalized radontransformations. IEEE Trans. on Circuits and Systems forVideo Technology, 2003, 8(13): 732-745.[22]Dong P and Galatsanos N P. Affine transformation resistantwatermarking based on image normalization. InternationalConference on Image Processing, Rochester, NY, UnitedStates, Sep 22-25 2002, 3: 489-492.[23]杨文学, 赵耀. 抵抗仿射变换攻击的多比特图像水印. 信号处理, 2004, 20(3): 245-250.Yang Wen-xue and Zhao Yao. Multi-bits image watermarkingresistantto afine transformations based on normalization.Signal Processing, 2004, 20(3): 245-250.[24]Dong P, Brankov J G, Galatsanos N P, Yang Y, and DavoineF. Digital watermarking robust to geometric distortions[J].IEEE Trans. on Image Process.2005, 14(12):2140-2150[25]Celik M U, Saber E, Sharma G, and Tekalp A M. Analysis offeature-based geometry invariant watermarking. Security andWatermarking of Multimedia Contents III, San Jose, CA, Jan22-25 2001, SPIE Vol.4314: 261-268.[26]Chotikakamthorn N, Pantuwong N, and Yawai W. Projectiveinvariant digital image watermarking technique using fourCo-Planar feature points. IEEE International Conference onImage Processing 2005, Genova, Italy, Sep 11-14 2005, 1:1005-1008.[27]Tang C W and Hang H M. A feature-based robust digitalimage watermarking scheme[J].IEEE Trans. on SignalProcessing.2003, 51(4):950-959[28]Bas P, Chassery J M, and Macq B. Geometrically invariantwatermarking using feature points. IEEE Trans. on ImageProcessing, 2002, 11(9): 1014-1028.[29]Petitcloas F A P and Anderson R J. Evaluation of copyrightmarking systems. Proceedings of the 1999 6th InternationalConference on Multimedia Computing and Systems, Florence,Italy, Jun 7-11 1999, 1: 574-579.
|