E. Koch, J. Zhao, Towards robust and hidden image copyright labeling, Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Halkidiki, Greece, June 20-22, 1995, 452-455.[2]I.J. Cox.[J].J. Kilian, T. Leighton, T. Shamoon, Secure spread spectrum waterm arking for images audio and video, IEEE Proc. Int. Conf. Image Processing(ICIP96), Lausanne, Switzerland.Vol. III.1996,:-[3]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, 6(12), 1673 1687.[4]L.F. Turner L F, Digital data security system, Patent IPN WO89/08915, 1989.[5]R.G. Schyndel, A. T. Tirkel, C. F. Osborne, A digital watermark, Int. Conf. on Image Processing,Vol.2, 1994, 86 90. [6]Scott Craver, Nasir Memon, Boon-Lock Yeo, Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications, IEEE J. on Selected Areas in Communications, 1998, 16(4), 573 586.[6]Daniel Augot, Jean-Marc. Jean-Francois, Secure delivery of image over open networks, Proc.IEEE, 1999, 87(7), 1251-1266.[7]Keith Hill, A Perspective: The role of identifiers in managing and protecting intellectual property in the digital age, Proc. IEEE, 1999, 87(7), 1228 1238.[8]W. Diffie, M. W. Hellmann, New directions in cryptography, IEEE Trans. on Info. Theory, 1976,IT-22(5), 644-645.
|