References


[1] http://www.cl.cam.ac.uk/~fapp2/watermarking/stirmark/

[2] M. Barni, et al., A Robust Watermarking Approach for Raw Video, in Proceedings of the Tenth International Packet Video Workshop, 2000.

[3] F. Bartolini, et al., A Data Hiding Approach for Correcting Errors in H.263 Video Transmitted Over a Noisy Channel, in Proceedings of the IEEE Fourth Workshop on Multimedia Signal Processing, pp. 65–70, 2001.

[4] P. Bas and B. Macq, A New Video-Object Watermarking Scheme Robust to Object Manipulation, in Proceedings of the IEEE International Conference on Image Processing, 2:526–529, 2001.

[5] J. Bloom, et al., Copy Protection for DVD Video, in Proceedings of the IEEE, 87(7):1267–1276, 1999.

[6] D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, in IEEE Transactions on Information Theory, 44(5): 1897–1905, 1998.

[7] I. Brown,C. Perkins, and J. Crowcroft, Watercasting: Distributed Watermarking of Multicast Media, in Proceedings of the First International Workshop on Networked Group Communication, vol. 1736 of Lecture Notes in Computer Science, Springer-Verlag, pp. 286–300, 1999.

[8] M. Costa, Writing on Dirty Paper, in IEEE Transactions on Information Theory, 29(3):439–441, 1983.

[9] I. Cox,M. Miller and J. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, ISBN 1-55860-714-5, 2001.

[10] S. Craver, et al., Can Invisible Watermarks Resolve Rightful Ownerships?, Technical Report RC 20509, IBM Research Division, 1996.

[11] F. Deguillaume, et al., Robust #D DFT Video Watermarking, in Proceddings of SPIE 3657, Security and Watermarking of Multimedia Content, pp. 113–124, 1999.

[12] F. Deguillaume,G. Csurka, and T. Pun, Countermeasures for Unintentionnal and Intentionnal Video Watermarking Attacks, in Proceedings of SPIE 3971, Security and Watermarking of Multimedia Content II, pp. 346–357, 2000.

[13] D. Delannay, et al., Compensation of Geometrical Deformations for Watermark Extraction in the Digital Cinema Application, in Proceedings of SPIE 4314, Security and Watermarking of Multimedia Content III, pp. 149–157, 2001.

[14] G. Depovere, et al., The VIVA Project: Digital Watermarking for Broadcast Monitoring, in Proceedings of the IEEE International Conference on Image Processing, 2:202–205, 1999.

[15] J. Dittmann,M. Stabenau, and R. Steinmetz, Robust MPEG Video Watermarking Technologies, in Proceedings of ACM Multimedia, pp. 71–80, 1998.

[16] J. Dittmann, et al., Combining Digital Watermarks and Collusion Secure Fingerprints for Digital Images, Proceedings of SPIE 3657, Security and Watermarking of Multimedia Content, pp. 171–182, 1999.

[17] J. Dittmann,A. Steinmetz, and R. Steinmetz, Content-Based Digital Signature for Motion Pictures Authentication and Content Fragile Watermarking, in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 2:209–213, 1999.

[18] J. Dittmann, et al., Combined Audio and Video Watermarking: Embedding Content Information in Multimedia Data, in Proceedings of SPIE 3971, Security and Watermarking of Multimedia Content II, pp. 176–185, 2000.

[19] J. Eggers and B. Girod, Informed Watermarking, The Kluwer International Series in Engineering and Computer Science, ISBN 1-4020-7071-3, 2002.

[20] C. Griwodz, et al., Protecting VoD the Easier Way, in Proceedings of ACM Multimedia, pp.21–28, 1998.

[21] J. Haitsma and T. Kalker, A Watermarking Scheme for Digital Cinema, in Proceedings of the IEEE International Conference on Image Processing, 2001.

[22] F. Hartung and B. Girod, Watermarking of Uncompressed and Compressed Video, in Signal Processing, 66(3):283–301, 1998.

[23] C.T. Hsu and J.-L. Wu, DCT-based Watermarking for Video, in IEEE Transactions on Consumer Electronics, 44(1):206–216, 1998.

[24] F. Jordan,M. Kutter, and T. Ebrahimi, Proposal of Watermarking Technique for Hiding/Retrieving Data in Compressed and Decompressed Video, in ISO/IEC JTC1/SC29/WG11, 1997.

[25] T. Kalker, et al., A Video Watermarking System for Broadcast Monitoring, in Proceedings of SPIE 3657, Security and Watermarking of Multimedia Content, pp. 103–112, 1999.

[26] S. Katzenbeisser and F. Petitcolas, Information Hiding: Techniques for Steganography and Digital Watermarking, Artech House, ISBN 1-58053-035-4, 1999.

[27] D. Kilburn, Dirty Linen, Dark Secrets, Adweek, 38(40):35–40, 1997.

[28] S.-W. Kim, et al., Perceptually Tuned Robust Watermarking Scheme for Digital Video Using Motion entropy Masking, in Proceedings of the IEEE International Conference on Consumer Electronics, pp. 104–105, 1999.

[29] M. Kutter and F. Petitcolas, Fair Benchmarking for Image Watermarking Systems, in Proceedings of SPIE 3657, Security and Watermarking of Multimedia Content, pp. 226–239, 1999.

[30] G. Langelaar and R. Lagendijk, Optimal Differential Energy Watermarking of DCT Encoded Images and Video, in IEEE Transactions on Image Processing, 10(1): 148–158, 2001.

[31] G. Langelaar,R. Lagendijk, and J. Biemond, Real-Time Labelling of MPEG-2 Compressed Video, in Journal of Visual Communication and Image Representation, 9(4):256–270, 1998.

[32] J. Lewis, Power to the Peer, LAWeekly, 2002.

[33] E. Lin, et al., Streaming Video and Rate Scalable Compression: What Are the Challenges for Watermarking?, in Proceedings of SPIE 4314, Security and Watermarking of Multimedia Content III, pp. 116–127, 2001.

[34] J.-P. Linnartz, The Ticket Concept for Copy Control Based on Embedded Signalling, in Proceedings of the Fifth European Symposium on Research in Computer Security, vol. 1485 of Lecture Notes in Computer Science, Springer, pp. 257–274, 1998.

[35] M. Maes, et al., Exploiting Shift Invariance to Obtain High Payload Digital Watermarking, in Proceedings of the International Conference on Multimedia Computing and Systems, 1:7–12, 1999.

[36] J. Meng and S. Chang, Tools for Compressed-Domain Video Indexing and Editing, in Proceedings of SPIE 2670, Storage and Retrieval for Image and Video Database, pp. 180–191, 1996.

[37] B. Mobasseri,M. Sieffert, and R. Simard, Content Authentication and Tamper Detection in Digital Video, in Proceedings of the IEEE International Conference on Image Processing, 1:458–461, 2000.

[38] D. Mukherjee,J. Chae, and S. Mitra, A Source and Channel Coding Approach to Data Hiding with Applications to Hiding Speech in Video, in Proceedings of the IEEE International Conference on Image Processing, 1:348–352, 1998.

[39] A. Patrizio, Why the DVD Hack was a Cinch, Wired, 1999.

[40] F. Petitcolas,R. Anderson, and M. Kuhn, Attacks on Copyright Marking Systems, in Proceedings of the Second International Workshop on Information Hiding, vol. 1525 of Lecture Notes in Computer Science, Springer, pp. 218–238, 1999.

[41] A. Piva,R. Caldelli, and A. De Rosa, A DWT-Based Object Watermarking System for MPEG-4 Video Streams, in Proceedings of the IEEE International Conference on Image Processing, 3:5–8, 2000.

[42] L. Qiao and K. Nahrstedt, Watermarking Methods for MPEG Encoded Video: Toward Resolving Rightful Ownership, in Proceedings of the IEEE International Conference on Multimedia Computing and Systems, pp. 276–285, 1998.

[43] C. Rey and J.-L. Dugelay, A survey of Watermarking Algorithms for Image Authentication, in EURASIP Journal on Applied Signal Processing, 6:613–621, 2002.

[44] C. Rey, et al., Toward Generic Image Dewatermarking?, in Proceedings of the IEEE International Conference on Image Processing, 2002.

[45] D. Robie and R. Mersereau, Video Error Correction using Data Hiding Techniques, in Proceedings of the IEEE Fourth Workshop on Multimedia Signal Processing, pp. 59–64, 2001.

[46] K. Su,D. Kundur, and D. Hatzinakos, A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks, in Proceedings of the IEEE International Conference on Image Processing, 1:818–821, 2001.

[47] K. Su,D. Kundur, and D. Hatzinakos, A Novel Approach to Collusion-Resistant Video Watermarking, in Proceedings of SPIE 4675, Security and Watermarking of Multimedia Content IV, pp. 491–502, 2002.

[48] M. Swanson,B. Zhu, and A. Tewfik, Data Hiding for Video-in-Video, in Proceedings of the IEEE International Conference on Image Processing, 2:676–679, 1997.

[49] M. Swanson,B. Zhu, and A. Tewfik, Multiresolution Scene-Based Video Watermarking Using Perceptual Models, in IEEE Journal on Selected Areas in Communications, 16(4):540–550, 1998.

[50] P. Termont, et al., How to Achieve Robustness Against Scaling in a Real-Time Digital Watermarking System for Broadcast Monitoring, in Proceedings of the IEEE International Conference on Image Processing, 1:407–410, 2000.

[51] W. Trappe,M. Wu, and K. Ray Liu, Collusion-Resistant Fingerprinting for Multimedia, in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, 4:3309–3312, 2002.




Handbook of Video Databases. Design and Applications
Handbook of Video Databases: Design and Applications (Internet and Communications)
ISBN: 084937006X
EAN: 2147483647
Year: 2003
Pages: 393

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net