References
- I. J. Cox, J. kilian, T. Leighton, and T. Sharnoon, 'Secure spread spectrum watermarking for multi media,' NEC Res. Insti., Princeton, NJ, Tech Rep., pp.95-100, 1995
- I. Pitas and T. Kaskalis, 'Applying Signatures on Digital Image,' Workshop on Nonlinear Signal and Image Processing, pp.460-463, June 1995
- K. T. Kim, J H. Kim, and E. S. Kim, 'Multiple Information Hiding Technique using Random Sequence and Hadamard Matrix,' Opt. Eng, vol.40, no.11, pp, 2489-2494, 2001 https://doi.org/10.1117/1.1410104
- J. J. K. O'Rauanidh and Thierry Pun, 'Rotation, Scale and Translation Invariant Digital Image Watermarking', Signal processing journal, 1998 https://doi.org/10.1016/S0165-1684(98)00012-7
- C. Y. Lin, 'Public Watermarking Surviving General Scaling and Cropping: An Application for Print and-Scan Process', ACM Multimedia 99, Orlando, FL, USA, Oct 1999
- C. Y. Lin and Shih-Fu Chang, 'Distortion Modeling and Invariant Extraction for Digital Image Print -and-Scan Process', ISMIP 99, Taipei, Taiwan, Dec. 1999
- R. Caldelli, M. Bami, F. Bartolini, and A. Piva, 'Geo-metric-Invariant Robust Watermarking through Constellation Matching in the Frequency domain,' Proceedings of 7th IEEE ICIP 2000, vol. II, pp.65-68, Vancouver, Canada, Sep., 2000 https://doi.org/10.1109/ICIP.2000.899227
- C. R. Choi and J. Jeong, 'Robust Image Watermarking Scheme Resilient to De-synchronization Attacks,' SPIE 2002 Security and Watermarking of Multimedia Contents W, San Jose, USA, Jan., 2002
- D. Gaber, 'A New Microscope Principle,' Nature, Vol.161, pp.777, 1948
- E. N. Leith and J. Upatnieks, 'Reconstructed Wavefronts and Communication Theory,' J Opt Soc. Am vol.52, pp.1377, 1962
- F. Hartung, J. K Su, and B. Girod, 'Spread Spectrum Watermarking: Malicious Attacks and Counterattacks,' Proceedings of SPIE 3657, Security and Watermarking of Multimedia Cotents, pp. 147-158, 1999