Managing copyright in open networks



Download 34.18 Kb.
Date06.08.2017
Size34.18 Kb.
#27961
REFERENCES (1 to 58)
[1] A. Piva, F. Bartolini, and M. Barni, “Managing copyright in open networks,” IEEE Trans.

Internet Computing, vol. 6, no. 3, pp. 18–26, May–Jun. 2002.

[2] Asifullah Khan, Anwar M. Mirza, and Abdul Majid, "Optimizing Perceptual Shaping of a

Digital Watermark Using Genetic Programming", Iranian Journal of Electrical And Computer

Engineering, Vol. 3, No. 2, 2004.

[3] Ankerbrandt, A., Unckles, B., Petry, F.: Scene recognition using genetic algorithms with

semantic nets. Pattern Recognition Lett. 11 (1990) 285-293.

[4] B Surekha, Dr GN Swamy, Dr K Srinivasa Rao, A Ravi Kumar. “A Watermarking

Technique based on Visual Cryptography”, Journal of Information Assurance and Security, Vol:

4, pp: 470-473, 2009.

[5] Bruyndonckx, O., Quisquater, J.-J., Macq, B., “Spatial method for copyright labeling of

digital images”, In: Proc. IEEE Workshop on Nonlinear Signal and Image processing, Neos

Marmaras, Greece, pp. 456–459, 1995.

[6] C. Lu, H. Yuan, and M. Liao, “Multipurpose watermarking for image authentication and

protection,” IEEE Trans. Image Process., vol. 10, No.10, pp. 1579–1592, Oct. 2001.

[7] Chae, J.J., and B.S., Manjunath, “A robust embedded data from wavelet coefficients”, Tech.

Rep., University of California, CA, 1997.

[8] Chu S C, Huang H C, Shi Y, and et al. Genetic Watermarking for Zerotree-Based

Applications. Circuits Systems Signal Process, Vol: 27, pp: 171-182, 2008.

[9] C. S. Shieh, H.-C. Huang, F. H. Wang, J. S. Pan, "Genetic watermarking based on transform

domain techniques," Patt. Recog., vol. 37, no. 3, pp. 555 - 565, Mar. 2004.

[10] Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M., 2002. Hierarchical watermarking for

secure image authentication with localization. IEEE Trans. Image Process., Vol: 11, No: 6, 585–

595.


[11] Chih-Chin Lai, Hsiang-Cheh Huang and Cheng-Chih Tsai, "A Digital Watermarking

Scheme Based On Singular Value Decomposition And Micro-Genetic Algorithm", International

Journal of Innovative Computing, Information and Control, Vol: 5, No: 7, July 2009.

[12] Chen Yongqiang, Zhang Yanqing, and Peng Lihua, "A DWT Domain Image Watermarking

Scheme Using Genetic Algorithm and Synergetic Neural Network", Proceedings of the 2009

International Symposium on Information Processing (ISIP’09) Huangshan, P. R. China, August

21-23, pp. 298-301, 2009.

[13] Cox I. J., Miller, M. L. and Bloom J. A., “Digital Watermarking”, Morgan Kaufmann

Publishers, USA, 2002.

[14] Chin-Shiuh Shieh, Chao-Chin Chang, Wei Kuang Lai, and Shu-Chuan Chu, "An Improved

Digital Watermarking Scheme in the Domain of Vector Quantization", Proceedings of the First

International Conference on Innovative Computing, Information and Control, Vol: 3, pp: 483 -

486, 2006.

[15] Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T., 1997. Secure spread spectrum

watermarking for multimedia. IEEE Trans. Image Process. 6 (12), 1673–1687.

16] Dominik Birk, Sean Gaines, and Christoph Wegener, "A Framework for Digital

Watermarking Next Generation Media Broadcasts", IAENG International Journal of Computer

Science, Vol. 35, No. 4, 2008.

[17] Dongeun Lee, Taekyung Kim, Seongwon Lee and Joonki Paik, "Genetic Algorithm-Based

Watermarking in Discrete Wavelet Transform Domain", Lecture Notes in Computer Science

(LNCS), Springer Berlin, Vol: 4113, pp: 709-716, 2006.

[18] Feng-Hsing Wanga, Lakhmi C. Jaina, Jeng-Shyang Pan, "VQ-based watermarking scheme

with genetic codebook partition", Journal of Network and Computer Applications, Vol: 30, pp:4–23, 2007.

[19] F.Y. Shih, and Y.T.Wu, “Enhancement of image watermark retrieval based on genetic

algorithm”, Journal on Vision Comm. Image Representation, Vol. 16, pp. 115–33, 2005.

[20] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding-a survey,” Proc. IEEE

Vol: 87, No: 7, pp: 1062-1078, 1999.

[21] G. Voyatzis and I. Pitas, “The use of watermarks in the protection of digital multimedia

products," IEEE Proceedings, vol. 87, No. 7, pp 1197-1207, July 1999.

[22] Goldberg DE. “Genetic algorithms in search, optimization and machine learning”, Reading,

MA: Addison-Wesley; 1992.

[23] Giulia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari,

"Watermarking robustness evaluation based on perceptual quality via genetic algorithms", IEEE

Transactions on Information Forensics and Security, Vol: 4 , No: 2, Pages: 207-216, 2009.

[24] G. C. Langelaar, I. Setywan, and R. L. Lagendijk, “Watermarking digital image and video

data,” IEEE Signal Process. Mag., Vol. 17, No. 5, pp. 20-46, Sep. 2000.

[25] Holland J. “Adaptation in Natural and Artificial Systems”, University of Michigan Press,

Ann Arbor, MI, 1975.

[26] H.-C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K.-C. Huang., “Progressive

Watermarking Techniques Using Genetic Algorithms”, Circuits Systems Signal Processing, Vol:

26, No: 5, pp: 671-687, 2007.

[27] Hsiang-Cheh Huang, Chi-Ming Chu and Jeng-Shyang Pan, "The optimized copyright

protection system with genetic watermarking", Journal of Soft Computing - A Fusion of

Foundations, Methodologies and Applications, Springer Berlin, Vol: 13, No: 4, pp : 333-343,

February, 2009.

[28] J.K. Su, J.J. Eggers, and B. Girod, “Analysis of digital watermarks subjected to optimum

linear filtering and additive noise”, Signal Processing, Special Issue on Information Theoretic

Issues in Digital Watermarking, Vol. 81, No. 6, pp. 1141-1175, 2001.

[29] Jo.M.Kim.H “A digital image watermarking scheme based on vector quantization,” IEICE

Trans. Inf. & Syst., Vol E85-D., pp: 303-305, 2002.

[30] Jiann-Shu Lee, Fong-Ping Chuang, Kuen-Horng Tsai, "Image Watermarking Based on

Multiple Objective Genetic Algorithm", Proceedings of the 2009 Fifth International Conference

on Intelligent Information Hiding and Multimedia Signal Processing, Pages: 102-105, 2009.

[31] Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk. “Steganographic Routing

in Multi Agent System Environment”, Journal of Information Assurance and Security, Vol: 2,

pp: 235-243, 2007.

[32] Katzenbeisser S. and Petitcolas F. A. P., “Information Hiding Techniques for

Steganography and Digital Watermarking”, Artech House, UK, 2000.

[33] Lino Coria, Panos Nasiopoulos, Rabab Ward and Mark Pickering. “An Access Control

Video Watermarking Method that is Robust to Geometric Distortions”, Journal of Information

Assurance and Security, Vol: 2, pp: 266-274, 2007.

[34] Lin, S.D., Chen, C.-F.,. “A robust DCT-based watermarking for copyright protection. IEEE

Trans. Consumer Electron. 46 (3), 415–421, 2000.

[35] Memon, N. and Wong, P., Protecting Digital Media Content. In: Communications of ACM,

pp. 35-43, Vol. 41, No. 7, July 1998.

[36] Mohanty, S.P., K.R., Ramakrishnan, and M.S., Kankanhalli, “A DCT domain visible

watermarking technique for images”, Tech. Rep., University of South Florida, USA, 1999.

[37] M. Barni, F. Bartoline, V. Cappellini, and A. Piva, A DCT Domain System for Robust

Image Watermarking, Technical Report, Department di Ingegneria Ellettronica, Universitia

Firenze, Italy, 2001.

[38] M. Kutter, and F. Petitcolas, “A fair benchmark for image watermarking systems”, SPIE

proc. of Electronic Imaging: Security and Watermarking of Multimedia Content, Vol. 3657,

1999.

[39] Miller, M.; Cox, I.J.; Linnartz, J.P.M.G.; Kalker, T., “A review of watermarking principles



and practices,” In Digital Signal Processing in Multimedia Systems, Edit. K. K. Parhi and T.

Nishitani, Marcell Dekker Inc., pp. 461-485, 1999.

[40] Nizar Sakr, Nicolas Georganas, and Jiying Zhao, "Copyright Protection of Image Learning

Objects using Wavelet-based", in proc. of 3rd annual e-learning conference on Intelligent

Interactive Learning Object Repositories, November, 2006.

[41] Ning Zhong, Zunwen He, Jingming Kuang, Zhihai Zhuo, "An Optimal Wavelet-Based

Image Watermarking via Genetic Algorithm", Proceedings of the Third International Conference

on Natural Computation, Vol: 03, Pages: 103-107, 2007.

[42] Nikolaidis, N., Pitas, I., 1998. “Robust image watermarking in the spatial domain”, Signal

Process. Vol: 66, no: 3, pp: 385–403, 1998.

[43] Pei-chun chen, Yung-sheng Chen and Wen-Hsing Hsu, "A Digital Image Watermarking

System: Modeling, Peformance Analysis, and Application", in Proc. of 12th IPPR Conference on

Computer Vision, Graphics and Image Processing, pp. 199-206, 1999.

[44] P.T. Yu, H.H. Tsai, and J.S. Lin, “Digital watermarking based on neural networks for color

images”, Signal Processing, Vol. 81, pp. 663–71, 2001.

[45] Prayoth Kumsawat, Kitti Attakitmongcol, Arthit Srikaew, "An optimal robust digital image

watermarking based on genetic algorithms in multiwavelet domain", WSEAS Transactions on

Signal Processing, Vol:5 , No: 1, pp: 42-51, 2009.

[46] Shaowei Weng, Yao Zhao and Jeng-Shyang Pan, “A Novel Reversible Data Hiding

Scheme”, International Journal of Innovative Computing, Information and Control, Vol. 4, No.

2, pp. 351-358, 2008.

[47] Sanjeev kumar, Balasubramanian Raman, Manoj Thakur, "Real coded genetic algorithm

based stereo image watermarking", IJSDIA Intl. Journal of secure digital information Age,

Vol:1, No:1, 2009.

[48] Shelby Pereia and Thierry Pun, "Fast Robust Template Matching for Affine Resistant Image

Watermarks," Proceedings of the Third International Workshop on Information Hiding, Lecture

Notes in Computer Science (LNCS), Vol. 1768, pp. 199 - 210, 1999.

[49] Tosihiro Akiyama, Fumiaki Motoyoshi, Osamu Uchida and Shohachiro Nakanishi, "Hybrid

Digital Watermarking For Color Images Based On Wavelet Transform", IADIS International

Conference Applied Computing, pp. 548 - 551, ISBN: 972-8924-09-7, 2006.

[50] V. Aslantas, “A singular-value decomposition-based image watermarking using genetic

algorithm”, Int. J. Electron. Commun. (AEÜ), Vol. 62, pp. 386 –394, 2008.

[51] Vleeschouwer, C., Delaigle, J., Macq,B.: Invisibility and application functionalities in

perceptual watermarking-an overview. Proc. IEEE. 90 (2002) 64–77

[52] Wong, P.W., 1998. A public key watermark for image verification and authentication. In:

Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425–429.

[53] Xiang-Yang Wang and Hong Zhao, "A Novel Synchronization Invariant Audio

Watermarking Scheme Based on DWT and DCT", IEEE Transactions On Signal Processing,

Vol. 54, No. 12, December 2006.

[54] Yeung, M. & Minzter, F. “An Invisible Watermarking technique for image verification”, In

Proceedings of the IEEE International Conference on Image Processing, pp: 680-683, 1997.

[55] Y.G. Fu, R.M. Shen, and H.T. Lu, “Watermarking scheme based on support vector machine

for color images”, Electron Letters, Vol. 40, pp. 986–993, 2004.

[56] Zhicheng Wei, Hao Li, Jufeng Dai, Sashuang Wang, "Image Watermarking Based On

Genetic Algorithm", IEEE International Conference on Multimedia and Expo, pp: 1117 - 1120,

2006.


[57] Zorana Bankovic, José M. Moya, Álvaro Araujo, Slobodan Bojanic and Octavio Nieto-

Taladriz. “A Genetic Algorithm-based Solution for Intrusion Detection”,. Journal of Information

Assurance and Security, Vol: 4, pp: 192-199, 2009.

[58] Zbigniew Piotrowski, Piotr Gajewski. “Voice spoofing as an impersonation attack and the



way of protection”, Journal of Information Assurance and Security, Vol: 2, pp: 223-225, 2007.
Directory: bitstream -> 123456789 -> 998
123456789 -> Biomchanics and Medicine in Swimming, Jyväskyla, Finland June 1998
123456789 -> A. gw student and alumni numbers summary 3
123456789 -> Lexicology in theory, practice and tests Study guide Recommended by the Academic Council of Sumy State University Sumy Sumy State University 2015
123456789 -> Keywords Domestication research, older adults, digital games, media adoption, motivation, time expenditure, display of technology, identification Corresponding Author
123456789 -> Clustering Microarray Data within Amorphous Computing Paradigm and Growing Neural Gas Algorithm
123456789 -> From Via della Scala to the Cathedral: Social Spaces and the Visual Arts in Paolo Uccello’s Florence
123456789 -> Paralinguistic factors affecting foreign language acquisition
998 -> Literature review

Download 34.18 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page