REFERENCES (1 to 58)

munchsistersΤεχνίτη Νοημοσύνη και Ρομποτική

17 Οκτ 2013 (πριν από 3 χρόνια και 2 μήνες)

103 εμφανίσεις

REFERENCES (1 to 58)


[1] A. Piva, F. Bartolini, and M. Barni, “Managing copyright in open networks,” IEEE Trans.

Internet Computing, vol. 6, no. 3, pp. 18

26, May

Jun. 2002.

[2] Asifullah Khan, Anwar M. Mirza, and Abdul Majid, "Optimizing Perceptual
Shaping of a

Digital Watermark Using Genetic Programming", Iranian Journal of Electrical And Computer

Engineering, Vol. 3, No. 2, 2004.

[3] Ankerbrandt, A., Unckles, B., Petry, F.: Scene recognition using genetic algorithms with

semantic nets. Pattern Reco
gnition Lett. 11 (1990) 285
-
293.

[4] B Surekha, Dr GN Swamy, Dr K Srinivasa Rao, A Ravi Kumar. “A Watermarking

Technique based on Visual Cryptography”, Journal of Information Assurance and Security, Vol:

4, pp: 470
-
473, 2009.

[5] Bruyndonckx, O., Quisquate
r, J.
-
J., Macq, B., “Spatial method for copyright labeling of

digital images”, In: Proc. IEEE Workshop on Nonlinear Signal and Image processing, Neos

Marmaras, Greece, pp. 456

459, 1995.

[6] C. Lu, H. Yuan, and M. Liao, “Multipurpose watermarking for image

authentication and

protection,” IEEE Trans. Image Process., vol. 10, No.10, pp. 1579

1592, Oct. 2001.

[7] Chae, J.J., and B.S., Manjunath, “A robust embedded data from wavelet coefficients”, Tech.

Rep., University of California, CA, 1997.

[8] Chu S C, Hua
ng H C, Shi Y, and et al. Genetic Watermarking for Zerotree
-
Based

Applications. Circuits Systems Signal Process, Vol: 27, pp: 171
-
182, 2008.

[9] C. S. Shieh, H.
-
C. Huang, F. H. Wang, J. S. Pan, "Genetic watermarking based on transform

domain techniques," P
att. Recog., vol. 37, no. 3, pp. 555
-

565, Mar. 2004.

[10] Celik, M.U., Sharma, G., Saber, E., Tekalp, A.M., 2002. Hierarchical watermarking for

secure image authentication with localization. IEEE Trans. Image Process., Vol: 11, No: 6, 585


595.

[11]
Chih
-
Chin Lai, Hsiang
-
Cheh Huang and Cheng
-
Chih Tsai, "A Digital Watermarking

Scheme Based On Singular Value Decomposition And Micro
-
Genetic Algorithm", International

Journal of Innovative Computing, Information and Control, Vol: 5, No: 7, July 2009.

[12]
Chen Yongqiang, Zhang Yanqing, and Peng Lihua, "A DWT Domain Image Watermarking

Scheme Using Genetic Algorithm and Synergetic Neural Network", Proceedings of the 2009

International Symposium on Information Processing (ISIP’09) Huangshan, P. R. China, Augus
t

21
-
23, pp. 298
-
301, 2009.

[13] Cox I. J., Miller, M. L. and Bloom J. A., “Digital Watermarking”, Morgan Kaufmann

Publishers, USA, 2002.

[14] Chin
-
Shiuh Shieh, Chao
-
Chin Chang, Wei Kuang Lai, and Shu
-
Chuan Chu, "An Improved

Digital Watermarking Scheme in
the Domain of Vector Quantization", Proceedings of the First

International Conference on Innovative Computing, Information and Control, Vol: 3, pp: 483
-

486, 2006.

[15] Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T., 1997. Secure spread spectrum

water
marking for multimedia. IEEE Trans. Image Process. 6 (12), 1673

1687.

16] Dominik Birk, Sean Gaines, and Christoph Wegener, "A Framework for Digital

Watermarking Next Generation Media Broadcasts", IAENG International Journal of Computer

Science, Vol. 35, N
o. 4, 2008.

[17] Dongeun Lee, Taekyung Kim, Seongwon Lee and Joonki Paik, "Genetic Algorithm
-
Based

Watermarking in Discrete Wavelet Transform Domain", Lecture Notes in Computer Science

(LNCS), Springer Berlin, Vol: 4113, pp: 709
-
716, 2006.

[18] Feng
-
Hsing
Wanga, Lakhmi C. Jaina, Jeng
-
Shyang Pan, "VQ
-
based watermarking scheme

with genetic codebook partition", Journal of Network and Computer Applications, Vol: 30, pp:4

23, 2007.

[19] F.Y. Shih, and Y.T.Wu, “Enhancement of image watermark retrieval based on ge
netic

algorithm”, Journal on Vision Comm. Image Representation, Vol. 16, pp. 115

33, 2005.

[20] F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, “Information hiding
-
a survey,” Proc. IEEE

Vol: 87, No: 7, pp: 1062
-
1078, 1999.

[21] G. Voyatzis and I. Pitas, “The
use of watermarks in the protection of digital multimedia

products," IEEE Proceedings, vol. 87, No. 7, pp 1197
-
1207, July 1999.

[22] Goldberg DE. “Genetic algorithms in search, optimization and machine learning”, Reading,

MA: Addison
-
Wesley; 1992.

[23] Giu
lia Boato, Valentina Conotter, Francesco G. B. De Natale, Claudio Fontanari,

"Watermarking robustness evaluation based on perceptual quality via genetic algorithms", IEEE

Transactions on Information Forensics and Security, Vol: 4 , No: 2, Pages: 207
-
216, 2
009.

[24] G. C. Langelaar, I. Setywan, and R. L. Lagendijk, “Watermarking digital image and video

data,” IEEE Signal Process. Mag., Vol. 17, No. 5, pp. 20
-
46, Sep. 2000.

[25] Holland J. “Adaptation in Natural and Artificial Systems”, University of Michigan

Press,

Ann Arbor, MI, 1975.

[26] H.
-
C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K.
-
C. Huang., “Progressive

Watermarking Techniques Using Genetic Algorithms”, Circuits Systems Signal Processing, Vol:

26, No: 5, pp: 671
-
687, 2007.

[27] Hsiang
-
Cheh Hua
ng, Chi
-
Ming Chu and Jeng
-
Shyang Pan, "The optimized copyright

protection system with genetic watermarking", Journal of Soft Computing
-

A Fusion of

Foundations, Methodologies and Applications, Springer Berlin, Vol: 13, No: 4, pp : 333
-
343,

February, 2009.

[28] J.K. Su, J.J. Eggers, and B. Girod, “Analysis of digital watermarks subjected to optimum

linear filtering and additive noise”, Signal Processing, Special Issue on Information Theoretic

Issues in Digital Watermarking, Vol. 81, No. 6, pp. 1141
-
1175, 20
01.

[29] Jo.M.Kim.H “A digital image watermarking scheme based on vector quantization,” IEICE

Trans. Inf. & Syst., Vol E85
-
D., pp: 303
-
305, 2002.

[30] Jiann
-
Shu Lee, Fong
-
Ping Chuang, Kuen
-
Horng Tsai, "Image Watermarking Based on

Multiple Objective Genetic

Algorithm", Proceedings of the 2009 Fifth International Conference

on Intelligent Information Hiding and Multimedia Signal Processing, Pages: 102
-
105, 2009.

[31] Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk. “Steganographic Routing

in
Multi Agent System Environment”, Journal of Information Assurance and Security, Vol: 2,

pp: 235
-
243, 2007.

[32] Katzenbeisser S. and Petitcolas F. A. P., “Information Hiding Techniques for

Steganography and Digital Watermarking”, Artech House, UK, 2000.

[3
3] Lino Coria, Panos Nasiopoulos, Rabab Ward and Mark Pickering. “An Access Control

Video Watermarking Method that is Robust to Geometric Distortions”, Journal of Information

Assurance and Security, Vol: 2, pp: 266
-
274, 2007.

[34] Lin, S.D., Chen, C.
-
F.,.
“A robust DCT
-
based watermarking for copyright protection. IEEE

Trans. Consumer Electron. 46 (3), 415

421, 2000.

[35] Memon, N. and Wong, P., Protecting Digital Media Content. In: Communications of ACM,

pp. 35
-
43, Vol. 41, No. 7, July 1998.

[36] Mohanty, S
.P., K.R., Ramakrishnan, and M.S., Kankanhalli, “A DCT domain visible

watermarking technique for images”, Tech. Rep., University of South Florida, USA, 1999.

[37] M. Barni, F. Bartoline, V. Cappellini, and A. Piva, A DCT Domain System for Robust

Image Wate
rmarking, Technical Report, Department di Ingegneria Ellettronica, Universitia

Firenze, Italy, 2001.

[38] M. Kutter, and F. Petitcolas, “A fair benchmark for image watermarking systems”, SPIE

proc. of Electronic Imaging: Security and Watermarking of Multim
edia Content, Vol. 3657,

1999.

[39] Miller, M.; Cox, I.J.; Linnartz, J.P.M.G.; Kalker, T., “A review of watermarking principles

and practices,” In Digital Signal Processing in Multimedia Systems, Edit. K. K. Parhi and T.

Nishitani, Marcell Dekker Inc., pp.

461
-
485, 1999.

[40] Nizar Sakr, Nicolas Georganas, and Jiying Zhao, "Copyright Protection of Image Learning

Objects using Wavelet
-
based", in proc. of 3rd annual e
-
learning conference on Intelligent

Interactive Learning Object Repositories, November, 2006.

[41] Ning Zhong, Zunwen He, Jingming Kuang, Zhihai Zhuo, "An Optimal Wavelet
-
Based

Image Watermarking via Genetic Algorithm", Proceedings of the Third International Conference

on Natural Computation, Vol: 03, Pages: 103
-
107, 2007.

[42] Nikolaidis, N.,
Pitas, I., 1998. “Robust image watermarking in the spatial domain”, Signal

Process. Vol: 66, no: 3, pp: 385

403, 1998.

[43] Pei
-
chun chen, Yung
-
sheng Chen and Wen
-
Hsing Hsu, "A Digital Image Watermarking

System: Modeling, Peformance Analysis, and Applicati
on", in Proc. of 12th IPPR Conference on

Computer Vision, Graphics and Image Processing, pp. 199
-
206, 1999.

[44] P.T. Yu, H.H. Tsai, and J.S. Lin, “Digital watermarking based on neural networks for color

images”, Signal Processing, Vol. 81, pp. 663

71, 200
1.

[45] Prayoth Kumsawat, Kitti Attakitmongcol, Arthit Srikaew, "An optimal robust digital image

watermarking based on genetic algorithms in multiwavelet domain", WSEAS Transactions on

Signal Processing, Vol:5 , No: 1, pp: 42
-
51, 2009.

[46] Shaowei Weng, Y
ao Zhao and Jeng
-
Shyang Pan, “A Novel Reversible Data Hiding

Scheme”, International Journal of Innovative Computing, Information and Control, Vol. 4, No.

2, pp. 351
-
358, 2008.

[47] Sanjeev kumar, Balasubramanian Raman, Manoj Thakur, "Real coded genetic alg
orithm

based stereo image watermarking", IJSDIA Intl. Journal of secure digital information Age,

Vol:1, No:1, 2009.

[48] Shelby Pereia and Thierry Pun, "Fast Robust Template Matching for Affine Resistant Image

Watermarks," Proceedings of the Third Internat
ional Workshop on Information Hiding, Lecture

Notes in Computer Science (LNCS), Vol. 1768, pp. 199
-

210, 1999.

[49] Tosihiro Akiyama, Fumiaki Motoyoshi, Osamu Uchida and Shohachiro Nakanishi, "Hybrid

Digital Watermarking For Color Images Based On Wavelet
Transform", IADIS International

Conference Applied Computing, pp. 548
-

551, ISBN: 972
-
8924
-
09
-
7, 2006.

[50] V. Aslantas, “A singular
-
value decomposition
-
based image watermarking using genetic

algorithm”, Int. J. Electron. Commun. (AEÜ), Vol. 62, pp. 386

394, 2008.

[51] Vleeschouwer, C., Delaigle, J., Macq,B.: Invisibility and application functionalities in

perceptual watermarking
-
an overview. Proc. IEEE. 90 (2002) 64

77

[52] Wong, P.W., 1998. A public key watermark for image verification and
authentication. In:

Proc. IEEE Int. Conf. Image Processing, Chicago, IL, pp. 425

429.

[53] Xiang
-
Yang Wang and Hong Zhao, "A Novel Synchronization Invariant Audio

Watermarking Scheme Based on DWT and DCT", IEEE Transactions On Signal Processing,

Vol. 54, N
o. 12, December 2006.

[54] Yeung, M. & Minzter, F. “An Invisible Watermarking technique for image verification”, In

Proceedings of the IEEE International Conference on Image Processing, pp: 680
-
683, 1997.

[55] Y.G. Fu, R.M. Shen, and H.T. Lu, “Watermarking

scheme based on support vector machine

for color images”, Electron Letters, Vol. 40, pp. 986

993, 2004.

[56] Zhicheng Wei, Hao Li, Jufeng Dai, Sashuang Wang, "Image Watermarking Based On

Genetic Algorithm", IEEE International Conference on Multimedia and
Expo, pp: 1117
-

1120,

2006.

[57] Zorana Bankovic, José M. Moya, Álvaro Araujo, Slobodan Bojanic and Octavio Nieto
-

Taladriz. “A Genetic Algorithm
-
based Solution for Intrusion Detection”,. Journal of Information

Assurance and Security, Vol: 4, pp: 192
-
199,

2009.

[58] Zbigniew Piotrowski, Piotr Gajewski. “Voice spoofing as an impersonation attack and the

way of protection”, Journal of Information Assurance and Security, Vol: 2, pp: 223
-
225, 2007.