Crave S, Yeo B L, Yeung M. Technical trials and legal tribulations. Communications of the ACM,1998, 41(7): 45-54. [2]Petitcolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system. In Proc. 2nd Int. Workshop Information Hiding, Portland, OR, Apr. 14-17, 1998: 218-238. [3]Unzign. http:∥www.altern.org/watermark. [4]Cox I J, Linnartz J. Public watermarks and resistance tampering. In Proc of ICIP97, Washington,DC, 1997: 26-29. [5]Cox I J, Linnartz J. Some general methods for tampering with watermarks. IEEE J. on Selected Areas in Communications, 1998, 16(4): 587-593. [6]Brown L G. A survey of image registration techniques. ACM Computing Surveys, 1992, 24(4):325-376. [7]Thvenaz P, Ruttimann U E, Unser M. A pyramid approach to subpixel registration based on intensity. IEEE Trans. on Image Processing, 1998, 7(1): 27-41. [8]刘九芬,王振武,黄达人.抗几何攻击的小波变换域图像水印算法.浙江大学学报(工学版),2003,37(4):386-392. [9]Davoine F. Watermarking et rsistance aux deformation gomtriques. In Cinquiemes journes dtudes et dchanges sur la compression et la representation des signaux audiovisuals (CORESA99), Centre de Recherch et Dveloppement de France Tlcom (Cnet), EURECOM,Conseil Gnral des Alpes-Maritimes and Tlcom Valley, Sophia-Antipolis, France, Jun. 1999:14-15.[10]Johnson N F, Duric Z, Jajodia S. Recovery of watermarks form distorted images. In Proc. 3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 361-375. [11]Braudaway G W, Minter F. Automatic recovery of invisible image watermarks from geometrically distorted images. In Proc. SPIE Security and Watermarking of Multimedia Contents I, CA, USA,2000, Vol.3971: 74-81. [12]Kang X G, Huang J W, Shi Y Q. An image watermarking algorithm robust to geometric distortion.Lecture Notes in Computers Science: Proc. of IWDW 2002, Spinger-Verlag, 2002, Vol. 2613:212-213. [13]刘瑞祯,谭铁牛.基于奇异值分解的数字图像水印方法.电子学报,2001,29(2):168-171. [14]ORuanaidh J J K, Pun T. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 1998, 66(3): 303-317. [15]Wu M, Miller L M, Bloom J A, et al.. A Rotation, scale, and translation resilient public watermark. In Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing 1999(ICASSP99),Phoenix, AZ, 1999. http:∥www.assuredigit.com/tech_doc/more/Cox_Rotation_ scaling_translation_resilient_public_watermark. PDF.[16]Lin C Y, Wu M, Bloom J A, et al.. Rotation, scale, and translation resilient watermarking for images. IEEE Trans. on Image Processing, 2001, 10(5): 765-782. [17]Lin C Y. Public watermarking surviving general scaling and cropping: An application for printand-scan process. Multimedia and Security Workshop at ACM Multimedia 99, Orlando, FL,USA, Oct. 1999. http:∥citeseer.ist.psu.edu/lin99public.html [18]Solachidis V, Pitas I. Circularly symmetric watermark embedding in 2-D DFT domain. IEEE Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP99), Phoenix, 1999, Vol. 6:3469-3472. [19]Licks V, Jordan R. On digital image watermarking robust to geometric transformations. IEEE Int. Conference on Image Processing, Vancounver, Canada, 2000: 690-693. [20]Lin C Y, Chang S F. Distortion modeling and invariant extraction for digital image print-and-scan process. International Symposium on Multimedia Information Processing (ISMIP 99), Taipei,Taiwan, Dec. 1999. http:∥www.ctr.columbia.edu/papers_advent/99/cylin-modelscan.pdf [21]Hayes M H. The reconstruction of a multidimensional sequence from the phase or magnitude of the FFT. IEEE Trans. on Acoustics, Speech and Signal Processing, 1992, (4): 140-154. [22]Fleet D J, Heger D J. Embedding invisible information in color images. In Proc. IEEE Int. Conf.on Image Processing (ICIP-97), Santa Barbara, October 1997, 1: 532-535. [23]Gruhl D, Bender W. Affine invariance. http:∥nif. www.media.mit.edu/DataHiding/affine/affine.html, 1995. [24]Kutter M. Watermarking resistance to translation, rotation, and scaling. In Proc. SPIE Multimedia Systems Applications, 1998, Vol. 3528: 423-431. [25]Honsinger C, Rabbani M. Data embedding using phase dispersion. In PICS 2000: Image Quality,Image Capture, Systems Conf., 2000, 3: 264-268. [26]Honsinger C W, Daly S J. Method for detecting rotation and magnification in image. U.S.Patent, 5835639, 1998.[27]Voloshynovskiy S, Deguillaume F, Pun T. Content adaptive watermarking based on a stochastic multiresolution image modeling. In EUSIPCO 2000, Tampere, Finland, September, 2000.http:∥citeseer.ist.psu.edu/380994.html [28]Pereira S, ORuanaidh J J K, Pun T. Secure robust digital watermarking using the lapped orthogonal transform. In IST/SPIE Electronic Image99, Session: Security and Watermarking of Multimedia Contents, San Jose, CA, USA, January 1999. http:∥citeseer.ist.psu.edu/pereira99-secure.html [29]Kang X G, Huang J W, Shi Y Q, et al.. A DWT-DFT composite watermarking scheme robust to both affine and JPEG compression. IEEE Trans. on Circuits and Systems for Video Technology,2003, 13(8): 776-786. [30]ORuanaidh J J K, Pereira S. A secure robust digital image watermark. In Electronic Imaging: Processing, Printing and Publishing in Colour, SPIE Proceedings, Ziirich, Switzerland,May 1998. (SPIE/IST/Europto Symposium on Advanced Imaging and Network Technologies).http:∥citeseer.ist.psu.edu/181609.html [31]Pereira S, ORuanaidh J J K, Deguillaume F, et al.. Template based recovery of Fourier-based watermarks using log-polar and log-log maps. IEEE Int. Conf on Multimedia Computing and Systems (ICMCS99), Florence, Italy, June 1999. http:∥citeseer.ist.psu.edu/pereira99template.html [32]Pereira S, Pun T. Fast robust template matching for affine resistant image watermarks. In Proc.3rd Int. Information Hiding Workshop, Dresden, Germany, 1999: 207-218. [33]Csurka G, Deguillaume F, ORuanaidh J J K, et al.. A Bayesian approach to affine transformation resistant image and video watermarking. In Proc. 3rd Int. Information Hiding Workshop,Dresden, Germany, 1999: 315-330. [34]Deguillaume F, Csurka G, ORuanaidh J J K, et al.. Robust 3D DFT video watermarking. In IST/SPIE Electronic Imaging99, Session: Security and Watermarking of Multimedia Contents,San Jose, CA, USA, January 1999, Vol.3657: 113-124. [35]Digimarc Corporation, Photographic Products and Methods Employing Embedded Information,US patent 5822436, 1999.[36]Piva A. Improving DFT watermarking robustness through optimum detection and synchronization, Multimedia and Security Workshop at ACM Multimedia99, GMD, Department of Electronic Engineering, University of Florence, Italy: Report 85.[37]Voloshynovskiy S, Pereira S, Iquise V, et al.. Attack modeling: Towards a second generation watermarking benchmark. Signal processing, 2001, 81(6): 1177-1214. [38]Herrigel A, Voloshynovskiy S, Rytsar Y. The watermark template attack. In Security and Watermarking of Multimedia Contents Ⅲ, Wong P W, Delp E J, Eds. SPIE Photonics West, Electronic Imaging 2001, San Jose, CA, USA, Jan. 2001, Vol.4314: 394-405. [39]Kutter M, Bhattacharjee S K, Ebrhimi T. Towards second generation watermarking schemes.ICIP99, Kobe, Japan, October 25-28, 1999, Vol. 3: 320-323. [40]Celik M U, Saber E, Sharma G, et al.. Analysis of feature-based geometry invariant watermarking.In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅲ, Jan. 2001, Vol.4314: 261-268. [41]Bas P, Chassery J M, Macq B. Robust watermarking based on the warping of pre-defined triangular patterns. In Proceedings of SPIE: Security and Watermarking of Multimedia Contents Ⅱ,San Jose, CA, USA, Jan. 2000, Vol. 3971: 99-109. [42]Kaewkamnerd N, Rao K R. Wavelet based watermarking detection using multiresolution image registration. TENCON 2000, Kaula Lumpur, Malaysia, Sept. 2000. http:∥www-ee.uta.edu/dip/paper/tencon_water.pdf.
|