참고문헌
- 2007 저작권 침해방지 연차보고서, http://www.mcst.go.kr, 2009
- I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Morgan Kaufmann, San Francisco, 2002
- W. Bender, D. Gruhl, N. Morimoto and A. Lu, "Techniques for data hiding," IBM Systems J. vol. 35, no. 3-4, pp. 313-336, 1996 https://doi.org/10.1147/sj.353.0313
- 오현오, 김현욱, 윤대희, 석종원, 홍진우, "강인한 오디오 워터마킹을 위한 새로운 반향 커널 설계," 한국음향학회지, 20권, 2호, 66-76쪽, 2001
- J. D. Gordy and L. Bruton, "Performance Evaluation of Digital Audio Watermarking Algorithm," in Proc. Circuits and Systems, vol. 1, pp. 456-459, 2000
- L. Boney, A. H. Tewfik and K. N. Handy, "Digital Watermarks for Audio Signals," IEEE Int. Conf. Multimedia Computing and Systems, pp. 473-480, 1996 https://doi.org/10.1109/MMCS.1996.535015
- M. D. Swanson, B. Zhu and A. H. Tewfix, "Current state of the art, challenges and future directions for audio water-marking," IEEE Int. Conf. Multimedia Computing and Systems, vol. 1, pp. 19-24, 1999 https://doi.org/10.1109/MMCS.1999.779114
- 김현욱, 오현오, 윤대희, 차일환, "공격에 강인한 고음질 디지털 오디오 워터마킹 시스템에 관한 연구," 제13회 신호처리합동학술대회 논문집, 13권, 1호, 771-774쪽, 2000
- P. bassia, I. Pitas and N. Nikolaidis, "Robusl Audio Water-marking in the Time Domain," IEEE Trans. Multimedia, vol. 3, no. 2, pp. 232-241, 2001 https://doi.org/10.1109/6046.923822
- J. Seok, J. Hong and J. Kim, "A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio," ETRI J. 24권, 3호, 181-189쪽, 2002 https://doi.org/10.4218/etrij.02.0102.0301
- J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997 https://doi.org/10.1109/83.650120
- 우동훈, 정의필, "특정 주파수계수를 이용한 오디오 워터마킹," 한국음향학회지, 22권, 4호, 269-275쪽, 2003
- 정원교, 이경환, 우홍체, 이용두, "MP3 압축 공격에 강인한 주파수 계수 분석을 이용한 오디오 워터마킹," 한국음향학회지, 24권, 8호, 492-497쪽, 2005
- 조병록, 정일용, 박창균, 이강현, "고음질을 위한 디지털 오디오 워터마킹에 관한 연구," 대한전자공학회논문지, 39권, 3호, 199-207쪽, 2002
- M. Costa, "Writing on Dirty Paper," IEEE Trans Information Theory, vol. 29, no. 3, pp. 439-441, 1983 https://doi.org/10.1109/TIT.1983.1056659
- J. A. Bloom, M. L. Miller, "Informed Detection Revisited," LNCS vol. 3304, pp, 29-41, 2005
- I. J. Cox, M. L. Miller, “The First 50 Years of Electronic Watermarking,” EURASIP J. Applied Signal Processing, vol. 2, pp. 126-132, 2002 https://doi.org/10.1155/S1110865702000525
- M. van der Veen, A. N. Lemma, T. Kaller, "Watermarking and fingerprinting for electronic music delivery,” Proc. SSMC 2004, pp. 200-211, 2004 https://doi.org/10.1117/12.525629
- 우동훈, 정의필, "주파수 대역에 따른 워터마크의 강인성," 한국신호처리시스템학회 하계 학술대회 논문집, 3권 1호, 37-40쪽, 2002
- A. V. Oppenheim and R. W. Schafer, Discrete-time Signal Processing 2/E, PRENTICE HALL, New Jersey, 1999
- Recommendation BS.1534-1: Method for the subjective assess-ment of intermediate quality levels of coding systems, ITU(International Telecommunication Union), 2003
- MUSHARA - A Matlab interface for MUSHRA listening tests (version 1.0), http://www.elec.qmul.ac.uk/digitalmusic/downloads/