Citation: | Cai Su, Qi Yue, Shen Xukunet al. Algorithm for robust blind image watermark[J]. Journal of Beijing University of Aeronautics and Astronautics, 2003, 29(10): 905-908. (in Chinese) |
[1] Dittmann J, Steinmetz, Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking . Proc of the 6th IEEE International Conference on Multimedia Computing and Systems . Florence, Italy,1999.209~213 [2] 易开祥,石教英,孙 鑫. 数字水印技术研究进展[J].中国图象图形学报,2001,6(2):111~117 Yi Kaixiang, Shi Jiaoying, Sun Xin. Digital watermarking techniques:an introductory review[J]. Journal of Image and Graphics, 2001,6(2):111~117(in Chinese) [3] Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia . Princeton, USA:NEC Research Institute, 1995 [4] Craver S, Memon N, Yeo B L, et al. Resolving rightful ownerships with invisible watermarking techniques:limitations, attacks, and implications[J]. IEEE Journal on Selected Areas in Communications, 1998, 16(4):573~586 [5] Zeng Wenjun, Liu Bede. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images[J]. IEEE Transactions on Image Processing,1999,8(11):1534~1548 [6] Kutter M, Peticolas F A P. A fair benchmark for images watermarking . Proceeding of SPIE . 1999. 3657~3665 [7] Pennebaker W B, Mitchell J L. JPEG:still image data compression standard[M]. New York:Van Nostrand Reinhold, 1993. 34~38
|