TY - JOUR AU - Chang, C. C. AU - Lin, P. Y. PY - 2008 DA - 2008// TI - Adaptive watermark mechanism for rightful ownership protection JO - J Syst Softw VL - 81 UR - https://doi.org/10.1016/j.jss.2007.07.036 DO - 10.1016/j.jss.2007.07.036 ID - Chang2008 ER - TY - JOUR AU - Podilchuk, C. I. AU - Delp, E. J. PY - 2001 DA - 2001// TI - algorithms and application JO - IEEE Signal Process Mag VL - 18 UR - https://doi.org/10.1109/79.939835 DO - 10.1109/79.939835 ID - Podilchuk2001 ER - TY - JOUR AU - Wong, P. W. AU - Memon, N. PY - 2001 DA - 2001// TI - Secret and public key image watermarking schemes for image authentication and ownership verification JO - IEEE Trans Image Process VL - 10 UR - https://doi.org/10.1109/83.951543 DO - 10.1109/83.951543 ID - Wong2001 ER - TY - JOUR AU - Lee, M. -. T. AU - Chang, H. T. PY - 2010 DA - 2010// TI - Adaptive image watermarking using phase-shifting digital holography embedded in the wavelet domain JO - Int J Inf Assur Secur VL - 5 ID - Lee2010 ER - TY - CHAP AU - Pitas, I. AU - Kaskalis, T. H. PY - 1995 DA - 1995// TI - Applying signatures on digital images BT - Proceedings of IEEE Nonlinear Signal Image Processing ID - Pitas1995 ER - TY - CHAP AU - Bruyndonckx, O. AU - Quisquater, J. J. AU - Macq, B. PY - 1995 DA - 1995// TI - Spatial method for copyright labeling of digital images BT - Proceedings of IEEE Nonlinear Signal and Image Processing ID - Bruyndonckx1995 ER - TY - JOUR AU - Wu, D. C. AU - Tsai, W. H. PY - 2003 DA - 2003// TI - A steganographic method for images by pixel-value differencing JO - Pattern Recognit Lett VL - 24 UR - https://doi.org/10.1016/S0167-8655(02)00402-6 DO - 10.1016/S0167-8655(02)00402-6 ID - Wu2003 ER - TY - JOUR AU - Yu, Y. H. AU - Chang, C. C. AU - Hu, Y. C. PY - 2005 DA - 2005// TI - Hiding secret data in images via predictive coding JO - Pattern Recognit VL - 38 UR - https://doi.org/10.1016/j.patcog.2004.11.006 DO - 10.1016/j.patcog.2004.11.006 ID - Yu2005 ER - TY - JOUR AU - Celik, M. U. AU - Sharma, G. AU - Tekalp, A. M. AU - Saber, E. PY - 2005 DA - 2005// TI - Lossless generalised-LSB data embedding JO - IEEE Trans Image Process VL - 14 UR - https://doi.org/10.1109/TIP.2004.840686 DO - 10.1109/TIP.2004.840686 ID - Celik2005 ER - TY - CHAP AU - Koch, E. AU - Zhao, J. PY - 1995 DA - 1995// TI - Toward robust and hidden image copyright labeling BT - Proceedings of IEEE Nonlinear Signal and Image Processing ID - Koch1995 ER - TY - CHAP AU - Cox, I. J. AU - Kilian, J. AU - Leighton, T. AU - Shammoon, T. PY - 1995 DA - 1995// TI - Secure spread spectrum watermarking for multimedia BT - Tech Rep 95-10 (NEC Res Inst PB - Princeton CY - NJ ID - Cox1995 ER - TY - JOUR AU - Chang, H. T. AU - Hsu, C. -. C. AU - Yeh, C. -. H. AU - Shen, D. F. PY - 2009 DA - 2009// TI - Image authentication and tampering localization based on watermarking embedding in wavelet domain JO - Opt Eng VL - 48 UR - https://doi.org/10.1117/1.3127192 DO - 10.1117/1.3127192 ID - Chang2009 ER - TY - JOUR AU - Chang, H. T. AU - Tsan, C. L. PY - 2005 DA - 2005// TI - Image watermarking by use of digital holography embedded in DCT domain JO - Appl Opt VL - 44 UR - https://doi.org/10.1364/AO.44.006211 DO - 10.1364/AO.44.006211 ID - Chang2005 ER - TY - JOUR AU - Lee, W. B. AU - Chen, T. H. PY - 2002 DA - 2002// TI - A publicly verifiable copy protection technique for still images JO - J Syst Softw VL - 62 UR - https://doi.org/10.1016/S0164-1212(01)00142-X DO - 10.1016/S0164-1212(01)00142-X ID - Lee2002 ER - TY - JOUR AU - Chang, C. C. AU - Hwang, K. F. AU - Hwang, M. S. PY - 2002 DA - 2002// TI - Robust authentication scheme for protecting copyrights of images and graphics JO - IEE Proc Vis Image Signal Process VL - 149 UR - https://doi.org/10.1049/ip-vis:20020372 DO - 10.1049/ip-vis:20020372 ID - Chang2002 ER - TY - JOUR AU - Chang, C. C. AU - Chuang, J. C. PY - 2002 DA - 2002// TI - An images intellectual property protection scheme for gray-level images using visual secrete sharing strategy JO - Patter Recognit Lett VL - 23 UR - https://doi.org/10.1016/S0167-8655(02)00023-5 DO - 10.1016/S0167-8655(02)00023-5 ID - Chang2002 ER - TY - JOUR AU - Chen, T. H. AU - Horng, G. AU - Lee, W. B. PY - 2005 DA - 2005// TI - A publicly verifiable copyright-proving scheme resistant to malicious attacks JO - IEEE Trans Indus Electron VL - 52 UR - https://doi.org/10.1109/TIE.2004.841083 DO - 10.1109/TIE.2004.841083 ID - Chen2005 ER - TY - JOUR AU - Lee, M. T. AU - Chang, H. T. PY - 2010 DA - 2010// TI - Copyright protection scheme for still images based on an image pinned field JO - Opt Eng VL - 49 UR - https://doi.org/10.1117/1.3488044 DO - 10.1117/1.3488044 ID - Lee2010 ER - TY - JOUR AU - Meiri, A. Z. AU - Yudilevich, E. PY - 1981 DA - 1981// TI - A pinned sine transform image coder JO - IEEE Trans Commun VL - 29 UR - https://doi.org/10.1109/TCOM.1981.1094935 DO - 10.1109/TCOM.1981.1094935 ID - Meiri1981 ER - TY - JOUR AU - Meiri, A. Z. PY - 1976 DA - 1976// TI - The pinned Karhunen-Loeve transform of a two dimensional Gauss-Markov field JO - Proc SPIE VL - 87 UR - https://doi.org/10.1117/12.954991 DO - 10.1117/12.954991 ID - Meiri1976 ER - TY - JOUR AU - Ho, A. T. S. AU - Zhu, X. AU - Guan, Y. L. PY - 2004 DA - 2004// TI - Image content authentication using pinned sine transform JO - EURASIP J Appl Signal Process VL - 14 UR - https://doi.org/10.1155/S111086570440506X DO - 10.1155/S111086570440506X ID - Ho2004 ER - TY - JOUR AU - Zhu, X. AU - Ho, A. T. S. AU - Marziliano, P. PY - 2007 DA - 2007// TI - A new semi-fragile image watermarking with robust tampering restoration using irregular sampling JO - Signal Process Image Commun VL - 22 UR - https://doi.org/10.1016/j.image.2007.03.004 DO - 10.1016/j.image.2007.03.004 ID - Zhu2007 ER - TY - JOUR AU - Aslantas, V. PY - 2008 DA - 2008// TI - A singular-value decomposition-based image watermarking using genetic algorithm JO - Int J Electron Commun (AEU) VL - 62 UR - https://doi.org/10.1016/j.aeue.2007.02.010 DO - 10.1016/j.aeue.2007.02.010 ID - Aslantas2008 ER - TY - JOUR AU - Bertsimas, D. AU - Tsitsiklis, J. PY - 1993 DA - 1993// TI - Simulated annealing JO - Stat Sci VL - 8 UR - https://doi.org/10.1214/ss/1177011077 DO - 10.1214/ss/1177011077 ID - Bertsimas1993 ER - TY - CHAP AU - Kennedy, J. AU - Eberhart, R. C. PY - 1995 DA - 1995// TI - Particle swarm optimization BT - Proceedings of IEEE International Conference on Neural Networks PB - Prentice Hall CY - Piscataway, NJ UR - https://doi.org/10.1109/ICNN.1995.488968 DO - 10.1109/ICNN.1995.488968 ID - Kennedy1995 ER - TY - JOUR AU - Duan, Q. Y. AU - Gupta, K. V. AU - Sorooshian, S. PY - 1993 DA - 1993// TI - Shuffled complex evolution approach for effective and efficient global minimization JO - J Opt Theor Appl VL - 76 UR - https://doi.org/10.1007/BF00939380 DO - 10.1007/BF00939380 ID - Duan1993 ER - TY - STD TI - Optimization algorithms2011. [http://biomath.ugent.be/~brecht/downloads.html] UR - http://biomath.ugent.be/~brecht/downloads.html ID - ref27 ER - TY - JOUR AU - Kazakova, N. AU - Margala, M. AU - Durdle, N. G. PY - 2004 DA - 2004// TI - Sobel edge detection processor for a real-time volume rendering system JO - Proceedings of the 2004 International Symposium on Circuits and Systems VL - 2 UR - https://doi.org/10.1109/ISCAS.2004.1329421 DO - 10.1109/ISCAS.2004.1329421 ID - Kazakova2004 ER - TY - JOUR AU - Qu, Y. D. AU - Cui, C. S. AU - Chen, S. B. AU - Li, J. Q. PY - 2005 DA - 2005// TI - A fast subpixel edge detection method using Sobel-Zernike moments operator JO - Image Vision Comput VL - 23 UR - https://doi.org/10.1016/j.imavis.2004.07.003 DO - 10.1016/j.imavis.2004.07.003 ID - Qu2005 ER - TY - JOUR AU - Cardoso, M. F. AU - Salcedo, R. L. AU - de Azevedo, S. F. PY - 1996 DA - 1996// TI - The simplex-simulated annealing approach to continuous non-linear optimization JO - Comput Chem Eng VL - 20 UR - https://doi.org/10.1016/0098-1354(95)00221-9 DO - 10.1016/0098-1354(95)00221-9 ID - Cardoso1996 ER -