A Multi-Quadrant, Integrated and Secure Model of Multiple Watermarking
K. Hill. A Perspective: The Role of Identifiers in Managing and Protecting Intellectual Property in the Digital Age. Proc. IEEE. 1999; 87: 1228–1238p.
B. Macq, J. Dittmann, E. J. Delp. Benchmarking of Image Watermarking Algorithms for Digital Rights Management. Proc. IEEE. 2004; 92: 971–984p.
A. M. Kampfer, H. Stogner, A. Uhl. Multiple Re-Watermarking Scenarios, in 13th IWSSIP. 2006; 53–56p.
N. P. Sheppard, R. S. Naini, P. Ogunbona. On Multiple Watermarking, in Proceedings of the 2001 Workshop on Multimedia and Security: New Challenges, Ottawa, Ontario, Canada: ACM. 2001; 3–6p.
J. H. Uhl, C. Koidl, A. Uhl. Multiple Blind Re-Watermarking with Quantisation-Based Embedding, in 18th IEEE (ICIP). 2011; 265–268p.
X. Feng, H. Zhang, H.-C. Wu, Y. Wu.A New Approach for Optimal Multiple Watermarks Injection. IEEE Signal Proc Let. 2011; 18: 575–578p.
NIST, Advanced Encryption Standard. FIPS. 2001; 1–47p.
NIST, Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised). NIST SP. 2007; 1–114p.
L. Harn, W. J. Hsin, M. Mehta.Authenticated Diffie-Hellman Key Agreement Protocol Using a Single Cryptographic Assumption. IEE Proc-Comm. 2005; 152: 404–410p.
K. D. Akdemir, D. Karakoyunlu, B. Sunar. Non-Linear Error Detection for Elliptic Curve Cryptosystems. IET Inform Secur. 2012; 6: 28–40p.
NIST, Recommendation for Key Management–Part 1: General (Revised). NIST SP. 2007; 1–142p.
J. Hu. The Improved Elliptic Curve Digital Signature Algorithm, in International Conference on EMEIT. 2011; 257–259p.
NIST, Secure Hash Standard (SHS), FIPS. 2012; 1–30p.
J. R. Vacca. Computer and Information Security, Morgan Kaufmann Publishers, 2009.
NIST, Mathematical Routines for the NIST Prime Elliptic Curves. NSA. 2010; 1–43p.
X. Li, J. Chen, D. Qin, et al. Research and Realization Based on Hybrid Encryption Algorithm of Improved AES and ECC. ICALIP. 2010; 396–400p.
E. L. Tan, W. S. Gan, S. K. Mitra. Fast Arbitrary Resizing of Images in the Discrete Cosine Transform Domain. IET Image Process. 2011; 5: 73–86p.
J. Jeon, J. Lee, J. Paik. Robust Focus Measure for Unsupervised Auto-Focusing Based on Optimum Discrete Cosine Transform Coefficients. IEEE Trans. Consumer Electron. 2011; 57: 1–5p.
NIST, Secure Hash Standard (SHS). FIPS Pubs, 2008; 1–27p.
A. L. Varna, H. Shan, A. Swaminathan, et al. Fingerprinting Compressed Multimedia Signals. IEEE Trans. Inf. Forensics Security. 2009; 4: 330–345p.
L. Pei-Yu, L. Jung-San, C. Chin-Chen. Dual Digital Watermarking for Internet Media Based on Hybrid Strategies. IEEE Trans. Circuits Syst. Video Technol. 2009; 19: 1169–1177p.
J. A. Hussein. Spatial Domain Watermarking Scheme for Colored Images Based on Log-average Luminance. Journal of Computing. 2010; 2: 100–103p.
Q. Yang, Y. Zhang, C. Yang, et al. Information Entropy Used in Digital Watermarking, in SOPO. 2012; 1–4p.
Z. Wang, A. C. Bovik, H. R. Sheikh, et al. Image Quality Assessment: from Error Visibility to Structural Similarity. IEEE Trans Image Process. 2004; 13: 600–612p.
G. A. Sathishkumar, S. Ramachandran, K. B. Bagan. Image Encryption Using Random Pixel Permutation by Chaotic Mapping, in IEEE Symposium on Computers and Informatics. 2012; 247–251p.
P. Hong, L. Hung, L. Hua. A Novel Fractal Image Watermarking. IEEE Trans. Multimedia. 2006; 8: 488–99p.
L. Zhang, F. Qian, Y. Gao, et al. A New Integration Scheme of Robust and Fragile for Secured Digital Watermarking, in International Colloquium on CCCM. 2008; 312–316p.
T. K. Tsui, X.-P. Zhang, D. Androutsos. Color Image Watermarking Using Multidimensional Fourier Transforms. IEEE Trans. Inf. Forensics Security. 2008; 3: 16–28p.
- There are currently no refbacks.