References
- Bender, W., Gruhl, D., Morimoto, N. and Lu, A. Techniques for data hiding. IBM Syst. J., 1996, 35, 313–336.
- Cox, J., Kilian, J., Leighton, F. T. and Shamoon, T. Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process., 1997, 6(12), 1673–1687.
- Barni, M., Bartolini, F., Cappellini, V. and Piva, A. A DCT-domain system for robust image watermarking. Signal Process., 1998, 66, 357–372.
- Hsu, C.-T. and Wu, J.-L. Hidden digital watermarks in images. IEEE Trans. Image Process., 1999, 8(1), 58–68.
- Lou, D.-C. and Sung, C.-H. Robust watermarking technique for digital image utilizing invariant relation of vector quantization indices. Imag. Sci. J., 2002, 50, 291–302.
- Podilchuck, C. I. and Zeng, W. Image-adaptive watermarking using visual models. IEEE J. Select. Areas Commun., 1998, 16(4), 525–539.
- Lou, D.-C. and Yin, T.-L. Adaptive digital watermarking using fuzzy logic technique. Opt. Eng., 2002, 41(10), 2675–2687.
- Solachidis, V. and Pitas, I. Circularly symmetric watermark embedding in 2D DFT domain. IEEE Trans. Image Process., 2001, 10(11), 1741–1753.
- Craver, S. and Katzenbeisser, S. Security analysis of public-key watermarking schemes. In Mathematics of Data/Image Coding, Compression, and Encryption, with Applications, Proceedings of SPIE, Vol. 4475 (Ed. M. S. Schmalz), 2001, pp. 172–182 (Society of Photo-optical Instrumental Engineers, Bellingham, Washington).
- Hartung, F. and Girod, B. Fast public-key watermarking of compressed video. In Proceedings of the IEEE International Conference on Image Processing, 1997, pp. 528–531. IEEE, Piscataway, NJ.
- Schyndel, R. G. van, Tirkel, A. Z. and Svalbe, I. D. Key independent watermark detection. In Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999, pp. 580–585. IEEE, Piscataway, NJ.
- Eggers, J. J., Su, J. K. and Girod, B. Asymmetric watermarking schemes. In Tagungsband des GI Workshops Sicherheit in Mediendaten, 2000 (Springer, Berlin).
- Eggers, J. J., Su, J. K. and Girod, B. Public key watermarking by eigenvectors of linear transforms. In Proceedings of the European Signal Processing Conference, 2000, EURASIP (European Association for Speech and Image Processing), Switzerland.
- Furon, T. and Duhamel, P. An asymmetric public detection watermarking technique. In Proceedings of the Third International Workshop on Information Hiding (Ed. A. Pfitzmann), 1999, Springer, Berlin, pp. 88–100.
- Craver, S. Zero knowledge watermark detection. In Proceedings of the Third International Workshop on Information Hiding (Ed. A. Pfitzmann), 1999, Springer, Berlin, pp. 101–116.
- Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signature and public-key cryptosystems. Commun. ACM, 1978, 21(2), 120–126.
- Stallings, W. Cryptography and Network Security: Principles and Practice, 2002, 3rd edition (Prentice-Hall, Englewood Cliffs, NJ).
- Lenstra, K. and Manasse, M. S. Factoring with two large primes. Math. Comput., 1994, 63, 785–798.
- Devaney, R. L. An Introduction to Chaotic Dynamical System, 1986 (Benjamin Cummings, San Francisco).
- Arnold, V. I. and Avez, A. Ergodic Problems of Classical Mechanics, 1968 (W. A. Benjamin, New York/Amsterdam).
- Habutsu, T., Nishio, Y., Sasase, I. and Mori, S. A secret key cryptosystem by iterating a chaotic map. In Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, 1991, Springer, Berlin, pp. 127–140.
- Lou, D.-C. and Sung, C.-H. A steganographic scheme for secure communication based on chaos and Euler theorem. IEEE Trans. Multimedia, to be published.
- Craver, S., Memon, N., Yeo, B.-L. and Yeung, M. M. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE J. Select. Areas Commun., 1998, 16(4), 573–586.