Broad Bibliography - Villanova University

salamiblackElectronics - Devices

Nov 27, 2013 (4 years and 7 months ago)


Nathan Singleton

Computerized Image Processing for Forgery Prevention

This research paper will investigate discuss problems with and make suggestions for
current forgery detection software.

Every year computers
have been able to display pictures with higher resolution. This has
made forging checks, identification, and paintings a simple task. The world economy suffers because of
forgery of all types of documents and paintings.


Song, Y. J., R. Z. Li
u, and T. A. Tan.
Digital Watermarking for Forgery Detection in Printed
. Tech. National Lab of Pattern Recognition Institute of Automation, Chinese Academy
of Sciences. Web. 14 Sept. 2009.

Great Research
paper of forgery. Good sources to look back at.]

Mohanty, Saraju P., N. Ranganathan, and Ravi K. Namballa.
VLSI Implementation of
VisibleWatermarking for a Secure Digital Still Camera Design
. Rep. Print.



[Proposes a hardware implementation in order to watermark pictures. Also shows two separate
algorithms and how they work when implemented.]

N. Memon and P. W. Wong, “Protecting Digital Media

Comm. of the ACM
, vol. 41, no.
7, pp. 34
43, Jul 1998.

[Gives definitions to specific types of watermarks and gives outlines of
what can be done with them.

Mohanty, Saraju P.
Digital Watermarking : A Tutorial Review
. Rep. Web. 25 Sept. 2009.

[Provides a history of hiding information, key definitions and comparisons of techniques.
Partially delves into Steganography]

Mohanty, Saraju P.
Watermarking of Digital Images
. Rep. IN

[Writes about technical issues with digital watermarking.
Talks about image distortion
and difficult keeping the image intact, while emplacing a watermark.]

Meerwald, Peter, and Shelby Pereira.
Attacks, applications

and evaluation of known
watermarking algorithms with Checkmark
. Tech. Austria: Department of Computing Science.
Print. [Checkmark is a tool that is used to evaluate watermarking algorithms. This paper
evaluates many algorithms that have been made in orde
r to hide messages in images. ]

Kundur, and Hatzinakos.
Digital Watermarking for Telltale Tamper
Proofing and Authentication
Tech. Toronto: Natural Sciences and Engineering Research Coucil and Canada, 1999. Print.

[Provides analysis for
digital watermarki
ng, and more specifically, fragile watermarking of still
images. The author provides research in order to help court rooms recognize legitimate images.]

Voyatzis, G., and I. Pitas.
The Use of Watermarks in the Protection of Digital Multimedia
. Rep
. Thessaloniki: University of Thessaloniki, 1999. Print. [Focuses on products
implementing Watermarking algorithms, and outlines ways in which media is stolen from

Sencar, Http://
EN=67618896, and Nasir Memon.
Watermarking and Ownership Problem: A Revisit
. Rep. 2005.
Web. 28 Sept. 2009. <
EN=67618896>. [This paper focuses on legal aspects and tries to resolve problems with image
forgery and theft. It goes over topics to help prevent theft with different types of Watermarking

Yeung, Minerv
a M., Scott A. Craver, Nasir Memon, and Boon
Lock Yeo.
Resolving Rightful
Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications
. Rep.
May 1998. Web. 28 Sept. 2009.

[This paper focuses only on invisible watermarking and whic
h techniques are best. It also talks
about the “ends” to watermarking and how it can be used in the real world.]