References
- J. Cox, J. Kilian, T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' NEC Research Institute Technical Report, 95-10, 1995
- I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for images, audio and video,' in Proc. 1996 Int. Conf. Image Processing, vol. III, pp. 243-246, Lausanne, Switzerland, Sept. 1996 https://doi.org/10.1109/ICIP.1996.560429
- A. Piva, M. Barni, F. Bartolini, and V. Cappellini, 'DCT-based watermark recovering without resorting to the uncorrupted original images,' in Proc. Int. Conf. Image Processing 97, vol. I, pp. 520-523, Santa Barbara, CA, USA, Oct. 1997 https://doi.org/10.1109/ICIP.1997.647964
- S. Craver, N. Memon, B. Yeo, and M. Yeung, 'Can invisible watermarking resolve rightful ownership?,' IBM Research Report, RC 20509, July 1996
- O.-H. Kwon, Y.-S. Kim, and R.-H. Park, 'Watermarking for still images using the human visual system,'in Proc. IEEE International Symposium on Circuit and System 99, vol. IV, pp. 76-79, Orlando, FL, USA, May/June 1999 https://doi.org/10.1109/ISCAS.1999.779946
- Y. S. Kim, O.-H. Kwon, and R.-H. Park, 'Wavelet based watermarking method for digital images using the human visual system,'in Electronics Letters, vol. 35, no. 6, pp. 466-468, March, 1999 https://doi.org/10.1049/el:19990327
- J. S. Lim, Two-Dimensional Signal and Image Processing, Prentice-Hall, 1990
- Requirements Group, MPEG-21 Overview v.3, ISO/IEC JTC1/SC29/WG11/N4511, Pattaya, Dec. 2001