참고문헌
- T. Kalker, J. Haitsma, and J. Oostveen, "Issues with digital watermarking and perceptual hashing," in Proc. SPIE 4518, Multimedia Systems and Applications IV, 2001.
- A. Menezes, P. Oorshot, S. Vanstone, Handbook of Applied Cryptography, CRC press, 1997.
- J. Seo, M. Jin, S. Lee, D. Jang, S. Lee, and C. Yoo, "Audio fingerprinting based on normalized spectral subband moments," IEEE Signal Process. Lett., Vol. 13, No. 4, pp. 209-212, Apr. 2006. https://doi.org/10.1109/LSP.2005.863678
- J. Fridrich, "Robust bit extraction from images," in Proc. IEEE Conf. on Multimedia Computing and Systems, pp. 536-540, 1999.
- R. Venkatesan, S. Koon, M.H. Jakubowski, and P. Moulin, "Robust image hashing," in Proc. IEEE Conf. on Image Processing, pp.664-666, 2000.
- J. Seo, J. Haitsma, T. Kalker, C. Yoo, "A robust image fingerprinting system using the Radon transform," Signal Processing: Image Communication, Vol. 19, pp. 325-339, 2004. https://doi.org/10.1016/j.image.2003.12.001
- A. Swaminathan, Y. Mao, M. Wu, "Robust and secure image hashing," IEEE Transactions on Information Forensics and Security, Vol. 1, No. 2, pp. 215-230, June 2006. https://doi.org/10.1109/TIFS.2006.873601
- F. Lefebvre, B. Macq, and J. Legat, "RASH: Radon soft hash algorithm," in Proc. European Signal Processing conference, pp. 299-302, 2002.
- D. Wu, X. Zhou, and X. Niu, "A novel image hash algorithm resistant to print-scan," Signal Processing, Vol. 89, No. 12, 2415-2424, Dec. 2009. https://doi.org/10.1016/j.sigpro.2009.05.016
- R. Wolfgang, C. Podilchuk, and E. Delp, "Perceptual watermarks for digital images and video," Proc. IEEE, Vol. 87, No.7, pp. 1108-1126, 1999. https://doi.org/10.1109/5.771067
- M. Barni, F. Bartolini, V. Cappellini, and A. Piva, "A DCT-domain system for robust image watermarking," Signal Processing, Vol. 66, No. 3, pp. 357-372, 1998. https://doi.org/10.1016/S0165-1684(98)00015-2
- Q. Cheng and T. Huang, "Robust optimum detection of transform domain multiplicative watermarks," IEEE Transactions on Signal Processing, Vol. 51, No. 4, pp. 906-924, 2003. https://doi.org/10.1109/TSP.2003.809374
- R. Barnett and D. Pearson, "Frequency mode LR attack operator for digitally watermarked images," Electronics Letters, Vol. 34, No. 19, pp. 1837-1839, 1998. https://doi.org/10.1049/el:19981323
- S. Pereira, S. Voloshynovskiy, M. Madueno, S. Marchand-Maillet, and T. Pun, "Second generation benchmarking and application oriented evaluation," in Proc. Information Hiding Workshop, pp. 340-353, 2001.