[1] P. CALLAU, R. DARAZI, and B. MACQ, Exhibition QIM-based watermarking for digital cinema, Proc. SPIE 7254, Media Forensics and Security, 72540U (February 04, 2009).
[2] M. J. LEE, K. S. KIM, T. W. OH, H. Y. LEE, and H. K. LEE, Improved watermark synchronization based on local auto-correlation function, Journal of Electronic Imaging, 18(2):1C11, April 2009.
[3] D. CHOI, H. DO, H. CHOI, and T. KIM, A BLIND MPEG-2 video watermarking robust to camcorder recording, Signal processing, 90(4):1327C1332, April 2010.
[4] S. WOHLGEMUTH, I. ECHIZEN, N. SONEHARA, and G. MULLER, On privacy-compliant disclosure of personal data to third parties using digital watermarking, Journal of Information Hiding and Multimedia Signal Processing, 2(2):270C281, 2011.
[5] F. C. CHANG, H. C. HUANG, and H. M. HANG, Layered access control schemes on watermarked scalable media, Journal of VLSI Signal Processing System for Signal, Image, and Video Technology, 49(3):443C455, 2007.
[6] F. DEGUILLAUME, G. CSURCA, J. ORUANAIDH, and T. PUN, Robust 3D DFT video watermarking, in Security and Watermarking of Multimedia Contents, P.W. Wong and E. J. Delp, Eds., Eds., San Jose, California, January 1999, Proc. SPIE 3657, pp. 113-124.
[7] M. KOUBAA, C. BEN AMAR, H. NICOLAS, Collusion-Resistant Video Watermarking Based on Video Mosaicking, ism, pp.161-168, Eighth IEEE International Symposium on Multimedia (ISM’06), 2006.
[8] F. HARTUNG and B. GIROD, Digital watermarking of MPEG-2 coded video in the bitstream domain, in Proc. Internet. Conf. on Acoustic, Speech,& Signal Processing ICASSP97, Munich, Germany, April 1997, vol.4, pp. 2621-2624.
[9] Jing ZHANG, Anthony T. S. Ho, Anthony T. S. Ho, Gang QIU, and PINA MARZILIANO, Follow Circuits and Systems II: Express Briefs, IEEE Transactions on Volume 54 (2) Institute of Electrical and Electronics Engineers C Feb 1, 2007.
[10] F. BARTOLINI, V. CAPPELLINI, R. CALDELLI, A. De Rosa, and A. Piva,MPEG-4 video data protection for multimedia fruition, International Conference on Virtual Systems and Multimedia, October 2000.
[11] M. BARNI, F. BARTOLINI, V. CAPPELLINI, A. LIPPI, and A. PIVA, A dwt-based algorithm for spatio-frequency masking of digital signatures, in Security and Watermarking of Multimedia Contents, Wong. Delp. Editors, Proceedings of SPIE Vol. 3657. S. Jose, CA, January 1999, pp. 31-39.
[12] K. GOPAL, and M. MADHAVI LATHA, Watermarking of digital video stream for source authentication, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 4, No 1, July 2010.
[13] JI-WON LEE, TAE-WOO OH, MIN-JEONG LEE, HEUNG-KYU LEE, and HAE-YEOUN LEE, Video Watermarking on Overlay Layer, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, October 2011.
[14] DAVID G. LOWE, Distinctive image features from scale-invariant key-points, International Journal of Computer Vision, 60, 2 (2004), pp. 91-110.
[15] J. MATAS, O. CHUM, U. MARTIN, and T PAJDLA. Robust wide baseline stereo from maximally stable extremal regions, Proc. of the British Machine Vision Conference, volume 1, pages 384-393, 2002.
[16] Xuejuan ZHANG, Xiaochun CAO, and JINGJIE LI, Geometric attack resistant image watermarking based on MSER, Frontiers of Computer Science, Volume 7, Issue 1, pp 145-156, February 2013.
[17] N. J. JAYANT, J. JOHNSTON, and R. SAFRANCK, Signal compression based on models of the human perception, Proc. Of the IEEE, vol. 81, pp.1385-1422, 1993.
[18] K. MIKOLAJCZYK, T. TUYTELAARS, C. SCHMID, A. ZISSERMAN, J. MATAS, F.SCHAFFALITZKY, T. KADIR, and L. VAN GOOL, A comparison of affine region detectors, Int. J. Computer Vision, vol. 65, no. 1-2, pp. 43-72, May 2005.
[19] LIU T M, ZHANG H J, and Qi F H, A novel video key-frame-extraction algorithm based on perceived motion energy model [J]. IEEE Trans on Circuits and Systems for Video Technology, 2003, 13(10): 1006-1013.
[20] C. LIU. Beyond Pixels: Exploring New Representations and Applications for Motion Analysis, Doctoral Thesis. Massachusetts Institute of Technology. May 2009.
[21] http://www.tcpdump.org.
|