5
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A variance-based public verifiable copyright protection scheme surviving intentional attacks

&
Pages 1-12 | Received 19 Feb 2002, Accepted 14 Aug 2002, Published online: 06 Oct 2016

REFERENCES

  • Cox, I. J. and Miller, M. L. A review of watermarking and the importance of perceptual modeling. Proc. Electronic Imaging ‘97, 1997.
  • Craver, S., Yeo, B. L. and Yeung, M. Technical trials and legal tribulations. Commun. ACM, 1998, 41(7).
  • Nikolaidis, N. and Pitas, I. Digital image watermarking: an overview. In IEEE International Conference on Multimedia Computing and Systems, 1999, Vol. 1, pp. 1–6.
  • Petticolas, F. A., Anderson, R. J. and Kuhn, M. G. Information hiding—a survey. In Proceedings of the IEEE, Special Issue on Protection of Multimedia Contents, 1999.
  • Wolfgang, R. B. and Delp, E. J. Fragile watermarking using the VW2D watermark. In Proceedings of the SPIE/IS&T Conference on Security and Watermarking of Multimedia Contents, SPIE Vol. 3657, San Jose, California, 1999.
  • Cox, I. J., Kilian, J., Leighton, F. T. and Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing, 1997, 6(12), 1673–1687.
  • Hsu, C. T. and Wu, J. L. Multiresolution watermarking for digital images. IEEE Trans. Circuits and System—II: Analog and Digital Signal Processing, 1998, 45(8).
  • Hsu, C. T. and Wu, J. L. Hidden digital watermarks in images. IEEE Trans. Image Processing, 1999, 8(1).
  • Lin, C. Y., Wu, M., Bloom, J. A., Miller, M. L., Cox, I. J. and Lui, Y. M. Rotation, scale, and translation resilient public watermarking for images. In SPIE Security and Watermarking of Multimedia Content II (EI ‘00), San Jose, California, 2000.
  • Lu, C. S., Huang, S. K., Sze, C. J. and Liao, H. Y. A new watermarking technique for multimedia protection. In Multimedia Image and Video Processing (Eds L. Guan, S. Y. Kung and J. Larsen), 2000 (CRC Press, Boca Raton, Florida); http://smart.iis.sinica.edu.tw/~lcs/.
  • Tsai, M. J., Yu, K. Y. and Chen, Y. Z. Joint wavelet and spatial transformation for digital watermarking. IEEE Trans. Consumer Electronics, 2000, 46(1).
  • Wolfgang, R. B., Podilchuk, C. I. and Delp, E. J. Perceptual watermarks for digital images and video. Proc. IEEE, 1999, 87(7).
  • unZign Watermark Removal Software, http://altern.org/watermark, 1997.
  • Chang, C. C, Hwang, K. F. and Hwang, M. S. A block based digital watermark for copy protection of images. In Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference, Beijing, PR China, 1999.
  • Chang, C. C. and Wu, H. C. An image protection scheme based on discrete cosine transformation. In Advances in Software Engineering and Multimedia Applications, Baden-Baden, Germany, 2000, Vol. 2, pp. 90–94.
  • Chang, C. C. and Wu, H. C. A copyright protection scheme of images based on visual cryptography. Imaging Science J. (to appear).
  • Kutter, M., Voloshynovskiy, S. and Herrigel, A. The watermark copy attack. In Proceedings of SPIE on Security and Watermarking of Multimedia Contents II, SPIE Vol. 3971, San Jose, California, 2000.
  • Surety web site, http://www.surety.com.
  • Shapiro, J. M. Embedded image coding using zerotrees of wavelet coefficients. IEEE Trans. Signal Processing, 1993, 41(12), 3445–3462.
  • Stollnitz, E. J., DeRose, T. D. and Salesin, D. H. Wavelets for computer graphics: a primer. IEEE Computer Graphics and Applic., 1995.
  • Wang, H. J. and Kuo, C. C. A multi-threshold wavelet coder (MTWC) for high fidelity image compression. In Proceedings of International Conference on Image Processing, 1997, Vol. 1, pp. 652–655.
  • Schneier, B. Applied Cryptography, 2nd edition, 1996 (John Wiley, New York).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.