REFERENCES
- Bors, A. G. and Pitas, I. Image watermarking using DCT domain constraints. In Proceedings of 1996 IEEE International Conference on Image Processing (CICIP'96), Vol. 3, September 1996, pp. 231–234.
- Chang, C. C., Hwang, K. F. and Hwang, M. S. A watermarking technique based on one-way hash functions. IEEE Trans. Consumer Electronics, May 1999, 45(2), 286–294.
- Chang, C. C, Hwang, K. F. and Hwang, M. S. A block based digital watermark for copy protection of images. In Proceedings of APCC/OECC'99, Beijing, Vol. 2, October 1999, pp. 977–980.
- Craver, S., Memon, N., Yeo, B. L. and Yeung, M. M. Resolving ownerships with invisible watermarking technique: limitations, attacks, and implication. In IEEE J. Selected Areas in Communs, 1998, 16(4), 573–586.
- Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Processing, January 1999, 8(1), 58–68.
- Kutter, M., Jordan, F. and Bossen, F. Digital watermarking of color images using amplitude modulation. J. Electronic Imaging, April 1998, 7(2), 326–332.
- Voyatzis, G. and Pitas, I. Protection digital image copyrights: a framework. IEEE Computer Graphics and Applies, 1999, 1, 18–24.
- Rao, K. R. and Yip, P. Discrete Cosine Transform—Algorithms, Advantages, Applications, 1990 (Academic Press, New York).
- Blundo, C., De Santis, A. and Naor, M. Visual cryptography for grey level images. Inf. Processing Lett., May 2000, 75(6), 255–259.
- Naor, N. and Shamir, A. Visual cryptography. In Advances in Cryptography: Eurocryp'94, 1995, pp. 1–12 (Springer-Verlag, Berlin).
- Kohda, T., Ookubo, Y. and Ishii, K. A color image communication using YIQ signals by spread spectrum techniques. In Proceedings of 1998 IEEE 5th International Symposium on Spread Spectrum Techniques and Applications, Vol. 3, September 1998, pp. 743–747.