Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues
暂无分享,去创建一个
[1] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[2] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[3] Adam Finkelstein,et al. Robust mesh watermarking , 1999, SIGGRAPH.
[4] Oliver Benedens,et al. Geometry-Based Watermarking of 3D Models , 1999, IEEE Computer Graphics and Applications.
[5] Jack C. Lee,et al. Toward on-line, worldwide access to Vatican Library materials , 1996, IBM J. Res. Dev..
[6] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[7] Jian Zhao,et al. In business today and tomorrow , 1998, CACM.
[8] Boon-Lock Yeo,et al. Watermarking 3D Objects for Verification , 1999, IEEE Computer Graphics and Applications.
[9] Hiroaki Date,et al. DIGITAL WATERMARKING FOR 3 D POLYGONAL MODEL BASED ON WAVELET TRANSFORM , .
[10] Lawrence O'Gorman,et al. Electronic marking and identification techniques to discourage document copying , 1994, Proceedings of INFOCOM '94 Conference on Computer Communications.
[11] Sviatoslav Voloshynovskiy,et al. Watermark copy attack , 2000, Electronic Imaging.
[12] Mahalingam Ramkumar. Data hiding in multimedia - theory and applications , 1999 .
[13] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).
[14] M. Garland,et al. Multiresolution Modeling: Survey & Future Opportunities , 1999 .
[15] C.-C. Jay Kuo,et al. Blind digital watermarking for cartoon and map images , 1999, Electronic Imaging.
[16] Ioannis Pitas,et al. Protecting Digital-Image Copyrights: A Framework , 1999, IEEE Computer Graphics and Applications.
[17] Steven H. Low,et al. Document identification for copyright protection using centroid detection , 1998, IEEE Trans. Commun..
[18] Wenjun Zeng,et al. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..
[19] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[20] Steven H. Low,et al. Performance comparison of two text marking methods , 1998, IEEE J. Sel. Areas Commun..
[21] Christophe De Vleeschouwer,et al. Watermarking algorithm based on a human visual model , 1998, Signal Process..
[22] Kannan Ramchandran,et al. Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[23] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[24] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[25] Nasir D. Memon,et al. Protocols for Watermark Verification , 2001, IEEE Multim..
[26] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[27] Hiroshi Masuda,et al. Watermarking three-dimensional polygonal models through geometric and topological modifications , 1998, IEEE J. Sel. Areas Commun..
[28] Ioannis Pitas,et al. Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.
[29] Lawrence O'Gorman,et al. The Document Spectrum for Page Layout Analysis , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[30] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..