REFERENCES
- Bender, W., Gruhl, D., Morimoto N. and Lu, A. Technique for data hiding. IBM Syst. J., 1996, 35(3), 313–336.
- Bors, A. G. and Pitas, I. Image watermarking using DCT domain constraint. IEEE International Conference on Image Processing (ICIP'96), 1996, Vol.3, pp. 231–234.
- Chang, C. C. and Tsai, C. S. A technique for computing watermark from digital image. Int. J. Computing and Informatica, 2000, 24, 391–396.
- Chang, C. C. and Hwang, K. F. A digital watermark scheme using human visual effects. Int. J. Computing and Informatica (to appear).
- Chang, C. C, Chen, T. S. and Chung, P. F. A technique for copyright protection of digital images based upon (t, n)-threshold scheme. Int. J. Computing and Informatica (to appear).
- Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image. Processing, 1998, 7(10), 1485–1488.
- Cox, I. J., Kilian, J., Leighton, T. and Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing, December 1997, 6(12), 1073–1687.
- Cox, I. J. and Linnartz, J. P. M. G. Some general methods for tampering with watermarks. IEEE J. Sel. Areas in Commun., May 1998, 16(4), 587–593.
- Craver, S., Memon, N., Yeo, B. L. and Yeung, M. M. Resolving ownerships with invisible watermarking technique: limitations, attacks, and implication. IEEE J. Sel. Areas in Commun., 1998, 16(4), 573–586.
- Hwang, M. S., Chang, C. C. and Hwang, K. F. A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electronics (to appear).
- Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Processing, January 1999, 8(1), 58–68.
- Kutter, M., Jordan, F. and Bossen, F. Digital watermarking of color images using amplitude modulation. J. Electronic Imaging, April 1998, 7(2), 326–332.
- Low, S. and Maxemchuk, N. Performance comparison of two text marking methods. IEEE J. Sel. Areas in Commun 1998, 16(4), 1017–1024.
- Naor, N. and Shamir, A. Visual cryptography. In Advances in Cryptography: Eurocrypt ‘94, 1995, pp. 1–2 (Springer-Verlag, Berlin).
- Obhuvhi, R., Masuda, H. and Aono, M. Watermarking three-dimensional polygonal models through geometric and topological modifications. IEEE J. Sel. Areas in Commun., 1998, 16(4), 551–560.
- Swason, M. D., Kobayashi, M. and Tewfik, A. H. Multimedia data embedding and watermarking techniques. Proc. IEEE, June 1998, 86(6), 1064–1087.
- Voyatzis, G. and Pitas, I. Protection digital image copyrights: a framework. IEEE Computer Graphics and Applic., 1999, 1, 18–24.
- Wolfgang, R. B. and Delp, E. J. An ownership for digital image. In Proceedings of 1996 International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996, Vol. 3, pp. 219–222.