REFERENCES (1 to 58)
[1] A. Piva, F. Bartolini, and M. Barni, “Managing copyright in open networks,” IEEE Trans.
Internet Computing, vol. 6, no. 3, pp. 18–26, May–Jun. 2002.
[2] Asifullah Khan, Anwar M. Mirza, and Abdul Majid, "Optimizing Perceptual Shaping of a
Digital Watermark Using Genetic Programming", Iranian Journal of Electrical And Computer
Engineering, Vol. 3, No. 2, 2004.
[3] Ankerbrandt, A., Unckles, B., Petry, F.: Scene recognition using genetic algorithms with
semantic nets. Pattern Recognition Lett. 11 (1990) 285-293.
[4] B Surekha, Dr GN Swamy, Dr K Srinivasa Rao, A Ravi Kumar. “A Watermarking
Technique based on Visual Cryptography”, Journal of Information Assurance and Security, Vol:
4, pp: 470-473, 2009.
[5] Bruyndonckx, O., Quisquater, J.-J., Macq, B., “Spatial method for copyright labeling of
digital images”, In: Proc. IEEE Workshop on Nonlinear Signal and Image processing, Neos
Marmaras, Greece, pp. 456–459, 1995.
[6] C. Lu, H. Yuan, and M. Liao, “Multipurpose watermarking for image authentication and
protection,” IEEE Trans. Image Process., vol. 10, No.10, pp. 1579–1592, Oct. 2001.
[7] Chae, J.J., and B.S., Manjunath, “A robust embedded data from wavelet coefficients”, Tech.
Rep., University of California, CA, 1997.
[8] Chu S C, Huang H C, Shi Y, and et al. Genetic Watermarking for Zerotree-Based
Applications. Circuits Systems Signal Process, Vol: 27, pp: 171-182, 2008.
[9] C. S. Shieh, H.-C. Huang, F. H. Wang, J. S. Pan, "Genetic watermarking based on transform
domain techniques," Patt. Recog., vol. 37, no. 3, pp. 555 - 565, Mar. 2004.
[10] Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M., 2002. Hierarchical watermarking for
secure image authentication with localization. IEEE Trans. Image Process., Vol: 11, No: 6, 585–
595.
[11] Chih-Chin Lai, Hsiang-Cheh Huang and Cheng-Chih Tsai, "A Digital Watermarking
Scheme Based On Singular Value Decomposition And Micro-Genetic Algorithm", International
Journal of Innovative Computing, Information and Control, Vol: 5, No: 7, July 2009.
[12] Chen Yongqiang, Zhang Yanqing, and Peng Lihua, "A DWT Domain Image Watermarking
Scheme Using Genetic Algorithm and Synergetic Neural Network", Proceedings of the 2009
International Symposium on Information Processing (ISIP’09) Huangshan, P. R. China, August
21-23, pp. 298-301, 2009.
[13] Cox I. J., Miller, M. L. and Bloom J. A., “Digital Watermarking”, Morgan Kaufmann
Publishers, USA, 2002.
[14] Chin-Shiuh Shieh, Chao-Chin Chang, Wei Kuang Lai, and Shu-Chuan Chu, "An Improved
Digital Watermarking Scheme in the Domain of Vector Quantization", Proceedings of the First
International Conference on Innovative Computing, Information and Control, Vol: 3, pp: 483 -
486, 2006.
[15] Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T., 1997. Secure spread spectrum
watermarking for multimedia. IEEE Trans. Image Process. 6 (12), 1673–1687.
16] Dominik Birk, Sean Gaines, and Christoph Wegener, "A Framework for Digital
Watermarking Next Generation Media Broadcasts", IAENG International Journal of Computer
Science, Vol. 35, No. 4, 2008.
[17] Dongeun Lee, Taekyung Kim, Seongwon Lee and Joonki Paik, "Genetic Algorithm-Based
Watermarking in Discrete Wavelet Transform Domain", Lecture Notes in Computer Science
(LNCS), Springer Berlin, Vol: 4113, pp: 709-716, 2006.
[18] Feng-Hsing Wanga, Lakhmi C. Jaina, Jeng-Shyang Pan, "VQ-based watermarking scheme
with genetic codebook partition", Journal of Network and Computer Applications, Vol: 30, pp:4–23, 2007.
[19] F.Y. Shih, and Y.T.Wu, “Enhancement of image watermark retrieval based on genetic
algorithm”, Journal on Vision Comm. Image Representation, Vol. 16, pp. 115–33, 2005.
[20] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding-a survey,” Proc. IEEE
Vol: 87, No: 7, pp: 1062-1078, 1999.
[21] G. Voyatzis and I. Pitas, “The use of watermarks in the protection of digital multimedia
products," IEEE Proceedings, vol. 87, No. 7, pp 1197-1207, July 1999.
[22] Goldberg DE. “Genetic algorithms in search, optimization and machine learning”, Reading,
MA: Addison-Wesley; 1992.
[23] Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari,
"Watermarking robustness evaluation based on perceptual quality via genetic algorithms", IEEE
Transactions on Information Forensics and Security, Vol: 4 , No: 2, Pages: 207-216, 2009.
[24] G. C. Langelaar, I. Setywan, and R. L. Lagendijk, “Watermarking digital image and video
data,” IEEE Signal Process. Mag., Vol. 17, No. 5, pp. 20-46, Sep. 2000.
[25] Holland J. “Adaptation in Natural and Artificial Systems”, University of Michigan Press,
Ann Arbor, MI, 1975.
[26] H.-C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K.-C. Huang., “Progressive
Watermarking Techniques Using Genetic Algorithms”, Circuits Systems Signal Processing, Vol:
26, No: 5, pp: 671-687, 2007.
[27] Hsiang-Cheh Huang, Chi-Ming Chu and Jeng-Shyang Pan, "The optimized copyright
protection system with genetic watermarking", Journal of Soft Computing - A Fusion of
Foundations, Methodologies and Applications, Springer Berlin, Vol: 13, No: 4, pp : 333-343,
February, 2009.
[28] J.K. Su, J.J. Eggers, and B. Girod, “Analysis of digital watermarks subjected to optimum
linear filtering and additive noise”, Signal Processing, Special Issue on Information Theoretic
Issues in Digital Watermarking, Vol. 81, No. 6, pp. 1141-1175, 2001.
[29] Jo.M.Kim.H “A digital image watermarking scheme based on vector quantization,” IEICE
Trans. Inf. & Syst., Vol E85-D., pp: 303-305, 2002.
[30] Jiann-Shu Lee, Fong-Ping Chuang, Kuen-Horng Tsai, "Image Watermarking Based on
Multiple Objective Genetic Algorithm", Proceedings of the 2009 Fifth International Conference
on Intelligent Information Hiding and Multimedia Signal Processing, Pages: 102-105, 2009.
[31] Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk. “Steganographic Routing
in Multi Agent System Environment”, Journal of Information Assurance and Security, Vol: 2,
pp: 235-243, 2007.
[32] Katzenbeisser S. and Petitcolas F. A. P., “Information Hiding Techniques for
Steganography and Digital Watermarking”, Artech House, UK, 2000.
[33] Lino Coria, Panos Nasiopoulos, Rabab Ward and Mark Pickering. “An Access Control
Video Watermarking Method that is Robust to Geometric Distortions”, Journal of Information
Assurance and Security, Vol: 2, pp: 266-274, 2007.
[34] Lin, S.D., Chen, C.-F.,. “A robust DCT-based watermarking for copyright protection. IEEE
Trans. Consumer Electron. 46 (3), 415–421, 2000.
[35] Memon, N. and Wong, P., Protecting Digital Media Content. In: Communications of ACM,
pp. 35-43, Vol. 41, No. 7, July 1998.
[36] Mohanty, S.P., K.R., Ramakrishnan, and M.S., Kankanhalli, “A DCT domain visible
watermarking technique for images”, Tech. Rep., University of South Florida, USA, 1999.
[37] M. Barni, F. Bartoline, V. Cappellini, and A. Piva, A DCT Domain System for Robust
Image Watermarking, Technical Report, Department di Ingegneria Ellettronica, Universitia
Firenze, Italy, 2001.
[38] M. Kutter, and F. Petitcolas, “A fair benchmark for image watermarking systems”, SPIE
proc. of Electronic Imaging: Security and Watermarking of Multimedia Content, Vol. 3657,
1999.
[39] Miller, M.; Cox, I.J.; Linnartz, J.P.M.G.; Kalker, T., “A review of watermarking principles
and practices,” In Digital Signal Processing in Multimedia Systems, Edit. K. K. Parhi and T.
Nishitani, Marcell Dekker Inc., pp. 461-485, 1999.
[40] Nizar Sakr, Nicolas Georganas, and Jiying Zhao, "Copyright Protection of Image Learning
Objects using Wavelet-based", in proc. of 3rd annual e-learning conference on Intelligent
Interactive Learning Object Repositories, November, 2006.
[41] Ning Zhong, Zunwen He, Jingming Kuang, Zhihai Zhuo, "An Optimal Wavelet-Based
Image Watermarking via Genetic Algorithm", Proceedings of the Third International Conference
on Natural Computation, Vol: 03, Pages: 103-107, 2007.
[42] Nikolaidis, N., Pitas, I., 1998. “Robust image watermarking in the spatial domain”, Signal
Process. Vol: 66, no: 3, pp: 385–403, 1998.
[43] Pei-chun chen, Yung-sheng Chen and Wen-Hsing Hsu, "A Digital Image Watermarking
System: Modeling, Peformance Analysis, and Application", in Proc. of 12th IPPR Conference on
Computer Vision, Graphics and Image Processing, pp. 199-206, 1999.
[44] P.T. Yu, H.H. Tsai, and J.S. Lin, “Digital watermarking based on neural networks for color
images”, Signal Processing, Vol. 81, pp. 663–71, 2001.
[45] Prayoth Kumsawat, Kitti Attakitmongcol, Arthit Srikaew, "An optimal robust digital image
watermarking based on genetic algorithms in multiwavelet domain", WSEAS Transactions on
Signal Processing, Vol:5 , No: 1, pp: 42-51, 2009.
[46] Shaowei Weng, Yao Zhao and Jeng-Shyang Pan, “A Novel Reversible Data Hiding
Scheme”, International Journal of Innovative Computing, Information and Control, Vol. 4, No.
2, pp. 351-358, 2008.
[47] Sanjeev kumar, Balasubramanian Raman, Manoj Thakur, "Real coded genetic algorithm
based stereo image watermarking", IJSDIA Intl. Journal of secure digital information Age,
Vol:1, No:1, 2009.
[48] Shelby Pereia and Thierry Pun, "Fast Robust Template Matching for Affine Resistant Image
Watermarks," Proceedings of the Third International Workshop on Information Hiding, Lecture
Notes in Computer Science (LNCS), Vol. 1768, pp. 199 - 210, 1999.
[49] Tosihiro Akiyama, Fumiaki Motoyoshi, Osamu Uchida and Shohachiro Nakanishi, "Hybrid
Digital Watermarking For Color Images Based On Wavelet Transform", IADIS International
Conference Applied Computing, pp. 548 - 551, ISBN: 972-8924-09-7, 2006.
[50] V. Aslantas, “A singular-value decomposition-based image watermarking using genetic
algorithm”, Int. J. Electron. Commun. (AEÜ), Vol. 62, pp. 386 –394, 2008.
[51] Vleeschouwer, C., Delaigle, J., Macq,B.: Invisibility and application functionalities in
perceptual watermarking-an overview. Proc. IEEE. 90 (2002) 64–77
[52] Wong, P.W., 1998. A public key watermark for image verification and authentication. In:
Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429.
[53] Xiang-Yang Wang and Hong Zhao, "A Novel Synchronization Invariant Audio
Watermarking Scheme Based on DWT and DCT", IEEE Transactions On Signal Processing,
Vol. 54, No. 12, December 2006.
[54] Yeung, M. & Minzter, F. “An Invisible Watermarking technique for image verification”, In
Proceedings of the IEEE International Conference on Image Processing, pp: 680-683, 1997.
[55] Y.G. Fu, R.M. Shen, and H.T. Lu, “Watermarking scheme based on support vector machine
for color images”, Electron Letters, Vol. 40, pp. 986–993, 2004.
[56] Zhicheng Wei, Hao Li, Jufeng Dai, Sashuang Wang, "Image Watermarking Based On
Genetic Algorithm", IEEE International Conference on Multimedia and Expo, pp: 1117 - 1120,
2006.
[57] Zorana Bankovic, José M. Moya, Álvaro Araujo, Slobodan Bojanic and Octavio Nieto-
Taladriz. “A Genetic Algorithm-based Solution for Intrusion Detection”,. Journal of Information
Assurance and Security, Vol: 4, pp: 192-199, 2009.
[58] Zbigniew Piotrowski, Piotr Gajewski. “Voice spoofing as an impersonation attack and the
way of protection”, Journal of Information Assurance and Security, Vol: 2, pp: 223-225, 2007.
Directory: bitstream -> 123456789 -> 998123456789 -> Biomchanics and Medicine in Swimming, Jyväskyla, Finland June 1998123456789 -> A. gw student and alumni numbers summary 3123456789 -> Lexicology in theory, practice and tests Study guide Recommended by the Academic Council of Sumy State University Sumy Sumy State University 2015123456789 -> Keywords Domestication research, older adults, digital games, media adoption, motivation, time expenditure, display of technology, identification Corresponding Author123456789 -> Clustering Microarray Data within Amorphous Computing Paradigm and Growing Neural Gas Algorithm123456789 -> From Via della Scala to the Cathedral: Social Spaces and the Visual Arts in Paolo Uccello’s Florence123456789 -> Paralinguistic factors affecting foreign language acquisition998 -> Literature review
Share with your friends: |