| 研究生: |
陳佶鴻 Chen, Ji-Hong |
|---|---|
| 論文名稱: |
基於浮水印特性之竄改影像檢測與復原 Tampered Image Detection and Recovery Based on Watermarking |
| 指導教授: |
陳進興
Chen, Chin-Hsing |
| 學位類別: |
博士 Doctor |
| 系所名稱: |
電機資訊學院 - 電腦與通信工程研究所 Institute of Computer & Communication Engineering |
| 論文出版年: | 2013 |
| 畢業學年度: | 101 |
| 語文別: | 英文 |
| 論文頁數: | 100 |
| 中文關鍵詞: | 浮水印 、竄改影像 、檢測 、復原 |
| 外文關鍵詞: | Watermarking, Tampered image, Detection, Recovery |
| 相關次數: | 點閱:92 下載:3 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年隨著網路的蓬勃發展及電腦科技的進步,數位版權也日益重要。當遭到外力破壞,脆弱式浮水印即刻消失,而強健式浮水印則仍可取出可辨識的浮水印。本論文結合脆弱式浮水印及強健式浮水印的特點,提出三個竄改影像的檢測與復原的方法。
第一個方法將原始影像做離散小波轉換(Discrete Wavelet Transformation)後得到的低頻部分去除最低位元(LSB),再將之轉換為QR Code。QR Code具有25%的錯誤糾正能力,因此可以提高資訊的安全性。最後利用toral automorphism方法攪亂QR Code並將之藏入原始影像的頻域。此一作為大幅增加了藏匿資料的安全性。實驗結果證明,當浮水印影像遭到外力溫和破壞時本方法可檢測到被破壞的區域,而破壞嚴重時本方法則檢測出浮水印失效。實驗證明,Lena、Natural、Road、Mountain及Waterfall藏入檢測資料後,PSNR值分別為39.24 dB、39.36 dB、39.01 dB、39.36 dB及39.41 dB.
第二個方法,利用SPIHT(Set Partitioning in Hierarchical Tree)小波壓縮法壓縮影像的重要區域(Region of Importance)後,以toral automorphism方法將之藏入影像的剩餘不重要區域。此一作為大幅增加藏匿資料的安全性。實驗結果證明本方法可以還原被溫和竄改的重要區域,而在大幅破壞下,則檢測出不可信任影像。實驗證明,犯罪現場、蒙娜麗莎、F-16及藝術品藏入浮水印後,PSNR值分別為39.72 dB、40.03 dB、39.00 dB及39.13 dB。上述影像被竄改後,將其還原,PSNR值分別為37.91 dB、38.17 dB、38.34 dB及38.78 dB。使用Lee方法與本論文提出方法還原被竄改影像,PSNR值分別為36.39 dB與38.58 dB。
第三個方法將浮水印方法應用於身分識別,將影像重要資訊轉為QR Code後,將之印於影像右下角做為一可見式浮水印,以方便使用者利用手持裝置讀取之。另外,利用MCDMA(Modulation of the Code Division Multiple Access)與DSSS(Direct Sequence Spread Spectrum)法將同一QR Code轉化為位元流後隨機藏匿於影像中作為一不可見浮水印。如此作為大幅增加藏匿資料的安全性與強健性。實驗結果證明,利用手持設備或光學讀取器便可輕易讀取影像資訊,而當條碼受到外力破壞,利用此一方法便可將原始條碼恢復。實驗證明,經JPEG壓縮破壞後,本論文所提方法仍可以取出QR code並正確辨識出隱藏文字的訊息。Huang方法與我們所提方法得到的浮水印影像,其PSNR值分別為22.81 dB與39.91 dB。
本論文的浮水印技術,不單藏匿重要資訊,更利用其作破壞檢測與復原。本論文提出的方法可應用於犯罪現場證物保存(實驗一、實驗二)及醫學影像或藝術品資訊儲存(實驗三)。
In the recent years, as the internet flourishes and computer techniques progress, the digital copyright is increasingly important. A fragile watermark suffers slight attack, but a robust watermark can endure heavy damage. This thesis proposed three methods by combining fragile and robust watermarking features. In the first approach, the host image is first transformed by the use of the discrete wavelet transform (DWT). After discarding two least significant bits (LSB) the lower frequency part is transformed into a Quick Response code (QR code) with 25% error correction capacity. Finally, the QR code is embedded into the host image in the frequency domain by using toral automorphism to hash the discrete cosine transform (DCT) block. The experimental results show that if the attack is mild the tampered area of the watermarked image can be detected. But when serious damage occurs the watermarked image becomes invalid. The peak signal-to-noise ratios (PSNRs) of the Lena, Natural, Road, Mountain and Waterfall after watermarking are 39.24 dB, 39.36 dB, 39.01 dB, 39.36 dB and 39.41 dB, respectively.
In the second approach, the region of importance (ROI) of the host image is compressed by the use of set partitioning the in hierarchical tree (SPIHT) wavelet compression method. Then it is embedded into the remaining area of the host image in the frequency domain by troal automorphism. This way, the security of the watermarked image is increased. The experimental results show that the proposed method can detect and recover mild damages in the ROI area. But when serious damage occurs the watermarked image becomes invalid. The PSNRs of Crime scene, Mona Lisa, F-16 and Patting after watermarking are 39.72 dB, 40.03 dB, 39.00 dB and 39.13 dB, respectively. And the PSNRs of the images recovered from the tampered above-mentioned images are 37.91 dB, 38.17 dB, 38.34 dB and 38.78 dB, respectively. The PSNRs of the image recovered from the tampered images by using the Lee’s method and our proposed method are 36.39 dB and 38.58 dB, respectively.
In the third approach, we applied watermarking to identification recognition. The image's information is first transformed to a QR code and then visibly embedded in the corner of the host image so that, it can be easily extracted by mobile devices. Simultaneously, a same but invisible watermark is embedded in the host image by using code division multiple access and direct sequence spread spectrum techniques. Experimental results show that if the barcode has external damage the invisible watermark can be extracted and used to recover the damaged barcode. The simulation result proved the QR code extracted from JPEG attacked host images can still identify the text label. The PSNRs of the watermarked images using the Huang’s method and our proposed are 22.81 dB and 39.91 dB, respectively.
In this thesis, the watermark technique is not only used to hide secret information but also applied to tampered area detection and recovery. The three methods proposed in the thesis can be applied to anticounterfeiting for archives, digital right management and protection of crime scene photos, etc.
[1] N. U. Ahmed, T. Natarajan and R. Kamisetty, “Discrete Cosine Transform,” IEEE Trans. on Computers, Vol. C-23, No. 1, pp. 90-93, 1974.
[2] R. S. Alomari and A. Al-Jaber, “A Fragile Watermarking Algorithm for Content Authentication,” International Journal of Computing & Information Sciences, Vol. 2, No. 1, pp. 27-37, 2005.
[3] Z. An and H. Liu, “Research on Digital Watermark Technology Based on LSB Algorithm,” IEEE Conf. on Computational and Information Sciences, pp. 207-210, 2012.
[4] M. Antonin, M. Barlaud and I. Daubechies, “Image Coding Using Wavelet Transform,” IEEE Trans. on Image Processing, Vol. 1, No. 2, pp. 205-220, 1992.
[5] M. Bahoura and J. Rouat, “Wavelet Speech Enhancement Based on Time–Scale Adaptation,” Speech Communication, Vol. 48, No. 12, pp. 1620-1637, 2005.
[6] M. Bahoura and J. Rouat, “Wavelet Speech Enhancement Using the Teager Energy Operator,” IEEE Signal Processing Letters, Vol. 8, No. 1, pp. 10-12, 2001.
[7] S. Benchikh and M. Corinthios, “Efficiency Evaluation of Different Wavelets for Image Compression,” IEEE Conf. on Information Science, Signal Processing and their Applications, pp. 1420-1421, 2012.
[8] G. Bhatnagar, B. Raman and K. Swaminathan, “DWT-SVD Based Dual Watermark Scheme,” IEEE Conf. on Applications of Digital Information and Web Technologies, pp. 526-531, 2008.
[9] A. Chammem, M. Mitrea and F. Prȇteux, “DWT-Based Stereoscopic Image Watermarking,” Stereoscopic Displays and Applications, Vol. 7863, 786326-1-10, 2011.
[10] L. Chang, W. G. Yan and W. D. Wang, “Research on Robust Image Perceptual Hashing Technology Based on Discrete Cosine Transform,” Business, Economics, Financial Sciences, and Management, Vol. 143, pp. 799-809, 2012.
[11] C. Charistopulos, A. Skodras and T. Ebrahimi, “The JPEG 2000 Still Image Coding System: An Overview,” IEEE Trans. Consumer Electronics, Vol. 46, pp. 1103-1127, 2000.
[12] W. Y. Chen, “Color Image Steganography Scheme Using Set Partitioning In Hierarchical Trees Coding, Digital Fourier Transform and Adaptive Phase Modulation,” Applied Mathematics and Computation, Vol. 185, pp. 432-448, 2007.
[13] W. Y. Chen and C. H. Chen, “A Robust Watermarking Scheme Using Phase Shift Keying With the Combination of Amplitude Boost and Low Amplitude Block Selection,” Pattern Recognition, Vol. 38, pp. 587-598, 2005.
[14] J. H. Chen and C. H. Chen, “A Watermarking Scheme Using Code Division Multiple Access and DWT,” International Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 13-16, 2009.
[15] W. Y. Chen and C. H. Chen, “Robust Watermarking Scheme for Still Images Using Frequency Shift Keying High-Variance Block Selection,” Optical Engineering, Vol. 42(6), pp. 1826-1835, 2003.
[16] J. H. Chen, C. H. Chen and W. Y. Chen, “A Steganography Technique Using Adaptive Phase Modulation,” The 3rd Intelligent Living Technology Conference, pp. 783-790, 2008.
[17] J. H. Chen, C. H. Chen and W. Y. Chen, “A Watermarking Method for Still Images Using Modified Code Division Multiple Access,” International Conf. on Intelligent Systems Design and Applications, pp. 352-357, 2008.
[18] W. Y. Chen, J. H. Chen and C. C. Liu, “Concealing Color Image Using Discrete Fourier Transform and Phase Modulation Technique,” Artificial Intelligence and Application, 2005.
[19] W. Y. Chen, J. H. Chen and C. C. Liu, “Steganography Scheme for Color Image Using DWT and Set Partitioning in Hierarchical Trees Coding,” Symposium on Application of Information, Management and Communication Technology, pp. 1-7, 2005.
[20] W. Y. Chen, J. H. Chen and C. C. Liu, “Watermarking Scheme for Still Image Using Modified Code Division Multiple Access Technique,” Conf. on Computer Vision Graphic and Image Processing, pp. 1048-1056, 2005.
[21] S. Chen and H. Leung, “Chaotic Watermarking for Video Authentication in Surveillance Applications,” IEEE Trans. on Circuits and Systems for Video Technology, Vol. 18, No. 5, pp. 704-709, 2008.
[22] G. X. Chen, B. L. Tang, Q. F. Chen and J. L. Tai, “Research into Digital Watermark Algorithm Based on Wavelet Domain,” Advanced Engineering Forum, Vol. 6-7, pp. 525-529, 2012.
[23] W. Y. Chen and J. W. Wang, “Nested Image Steganography Scheme Using QR-barcode Technique,” Optical Engineering, Vol.48(5), pp. 057004-1-10, 2009.
[24] Z. Chen, Y. Zhang, C. Sun and W. Yang, “Fusing Discrete Cosine Transform and Multi-level Center-Symmetric Local Binary Pattern Features for Particular Recognition,” Intelligent Science and Intelligent Data Engineering, Vol. 7751, pp. 810-816, 2013.
[25] M. Y. Cheng and J. C. Chen, “Integrating Barcode and GIS for Monitoring Construction Progress,” Automation in Construction, Vol. 11, pp. 23-33, Jan., 2002.
[26] H. Chung, W. Y. Chen and C. M. Tu, “Image hidden technique using QR-barcode,” IEEE Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 522-525, Sep., 2009.
[27] G. Coatrieux, L. Lecornu, C. Roux and B. Sankur, “A Review of Image Watermarking Application in Healthcare,” Conf. on Engineering in Medicine and Biology, pp. 4691-4694, 2006.
[28] A. Collins, A. Zomorodian, G. Carlsson and L. J. Guibas, “A Barcode Shape Descriptor for Curve Point Cloud Data,” Computer and Graphics, Vol. 28, pp. 881-894, 2004.
[29] M. U. Çelik, G. Sharma, E. Saber and A. M. Tekalp, “Hierarchal Watermarking for Secure Image Authentication with Localization,” IEEE Trans. on Image Processing, Vol. 11, No. 6, pp. 585-595, 2002.
[30] I. Daubechies, “The Wavelet Transform, Time-Frequency Localization and Signal Analysis,” IEEE Trans. on Information Theory, Vol. 36, pp. 961-1005, 1990.
[31] K. Deb, M. D. Al-Seraj, M. M. S. Kowsar and I. H. Strategic, “A Joint DWT-DCT Based Watermarking Technique for Avoiding Unauthorized Replication,” IEEE Proceedings International Forum on Strategic Technology, pp. 1-5, 2012.
[32] H. Demirel and G. Anbarjafari, “Image Resolution Enhancement by Using Discrete and Stationary Wavelet Decomposition,” IEEE Trans. on Image Processing, Vol. 20, No. 5, pp. 1458-1460, 2011.
[33] H. Deng, L. Chen, J. Zhang and R. Wang, “A 3D Model Watermarking Algorithm Resistant to Affine Transformation,” IEEE Conf. on Multimedia Information Networking and Security, pp. 549-551, 2012.
[34] S. Dogan, T. Tuncer, E. Avci and A. Gulten, “A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images,” Journal of Medical System, Vol. 36, No. 4, pp. 2379-2385, 2012.
[35] V. G. Efimov, J. N. Lozhkova and N. Mikhail, “The Program Complex Wavelet Processing of the Results Ultrasonic and Microwave Research of Power Plants,” IEEE Conf. Micro/Nanotechnologies and Electron Devices, pp. 90-93, 2012.
[36] W. H. Fang, N. C. Hu and S. K. Shih, “Recursive Fast Computation of the Two-Dimensional Discrete Cosine Transform,” IEEE Proc. on Vision, Image and Signal Processing, Vol. 146, No. 1, pp. 25-33, 1999.
[37] C. Fei, R. H. Kwong and D. Kundur, “A Hypothesis Testing Approach to Semifragile Watermark-Based Authentication,” IEEE Trans. on Information Forensics and Security, Vol. 4, No. 2, pp. 179-192, 2009.
[38] M. Fierro, H. Ha and Y. Ha, “Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage,” IEEE Trans. on Image Processing, Vol. PP, No. 99, pp. 2-15, 2013.
[39] D. E. Gilsinn, G. S. Cheok and D. P. O’Leary, “Reconstructing Images of Bar Code for Construction Site Object Recognition,” Automation in Construction, Vol. 13, pp. 21-35, 2004.
[40] J. H. Guo, “Wavelet Bookmark,” Department of Mathematic National Central University.
[41] P. Hill, A. Achim and D. Bull, “The Undecimated Dual Tree Complex Wavelet Transform and Its Application to Bivariate Image Denoising Using A Cauchy Model,” IEEE Conf. on Image Processing, pp. 1205-1208, 2012.
[42] G. Hospodar, I. Verbauwhede and J. G. R. C. Gomes, “Algorithms for Digital Image Steganography Via Statistical Restoration,” IEEE Conf. on Symposium on Information Theory and Signal Processing in the Benelux, 2012.
[43] S. L. Hsieh, C.P. Yeh and I. J. Tsai, “An Image Copyright Protection Scheme with Tamper Detection Capability,” Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 342-349, 2009.
[44] W. C. Hu, W. H. Chen and C. Y. Yang, “Robust Image Watermarking Based on Discrete Wavelet Transform-Discrete Cosine Transform-Singular Value Decomposition,” Journal of Electronic Imaging, Vol. 21, No. 3, pp. 033005-1-7, 2012.
[45] H. C. Huang, F. C. Chang and W. C. Fang, “Reversible Data Hiding with Histogram-Based Difference Expansion for QR Code Applications,” IEEE Trans. on Consumer Electronics, Vol. 57, No. 2, pp. 779-787, 2011.
[46] X. Huang and B. Zhang, “Statistically Robust Detection of Multiplicative Spread-Spectrum Watermarks,” IEEE Trans. on Information Forensics and Security, Vol. 2, pp. 1-13, 2007.
[47] J. In, S. Hsiarani and F. Kossentini, “On RD Optimized Progressive Image Coding Using JPEG,” IEEE Trans. on Image Processing, Vol. 8, No. 11, pp. 1630-1638, 1999.
[48] V. Jeengar, S. N. Omkar, A. Singh, M. K. Yadav and S. Keshri, “A Review Comparison of Wavelet and Cosine Image Transforms,” International Journal of Image, Graphics and Signal Processing, Vol. 4, No. 11, pp. 16-25, 2012.
[49] M. V. Joshi, B. Vaibhav and M. S. Raval, “Multilevel Semi-Fragile Watermarking Technique for Improving Biometric Fingerprint System Security,” Intelligent Interactive Technologies and Multimedia, Vol. 276, pp. 272-283, 2013.
[50] T. W. Kan, C. H. Teng and W. S. Chou, “Applying QR Code in Augmented Reality Applications,” Conf. on Virtual Reality Continuum and Application in Industry, pp. 253-257, 2009.
[51] X. Kang, R. Yang and J. W. Huang, “Geometric Invariant Audio Watermarking Based on an LCM Feature,” IEEE Trans. on Multimedia, Vol. 13, No. 2, pp. 181-190, 2011.
[52] K. Khaldi and A. Boudraa, “Audio Watermarking Via EMD,” IEEE Trans. on Audio, Speech, and Language, Vol. 21, No. 3, 2013.
[53] L. T. Ko, J. E. Chen, Y. S. Shieh and T. Y. Yun, “A Novel Fractional Discrete Cosine Transform Based Reversible Watermarking for Biomedical Image Applications,” IEEE Conf. on Computer, Consumer and Control, pp. 36-39, 2012.
[54] S. Kornsing and J. Srinonchat, “Exploring Dynamic Time Warping Technique to Wavelet Speech Compression,” IEEE Conf. on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, pp. 1-4, 2012.
[55] D. Kunder and D. Hatzinakos, “Digital Watermarking for Tileable Tamper Proofing and Authentication,” Journals & Magazines, Vol. 87, pp. 1167-1180, 1999.
[56] N. V. Lalitha, G. Suresh and P. Telagarapu, “Audio Authentication Using Arnold and Discrete Cosine Transform,” IEEE Conf. on Computing, Electronics and Electrical Technologies, pp. 530-532, 2012.
[57] M. Lang, H. Guo, J. E. Odegard, C. S. Burrus and R.O. Wells, "Nonlinear Processing of A Shift Invariant DWT for Noise Reduction," SPIE Conf. on Wavelet Applications, Vol. 2491, pp. 640-651, 1995.
[58] T. Y. Lee and S. D. Lin, “Dual Watermark for Image Tamper Detection and Recovery,” Pattern Recognition, Vol. 41, pp. 3497-3506, 2008.
[59] Y. Lee, J. Nah and J. Kim, “Digital Image Watermarking Using Bidimensional Empirical Mode Decomposition in Wavelet Domain,” International Symposium on Multimedia, pp. 583-588, 2009.
[60] C. Li, B. Ma, Y. Wang, D. Huang and Z. Zhang, “A Secure Semi-Fragile Self-Recoverable Watermarking Algorithm Using Group-Based Wavelet Quantization,” Advances in Multimedia, Vol. 7674, pp. 327-336, 2012.
[61] P. L. Lin, C. K. Hsieh and P. W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery,” Pattern Recognition, Vol. 38, pp. 2519-2529, 2005.
[62] S. D. Lin and Y. H. Huang, “An Integrated Watermarking Technique with Tamper Detection and Recovery,” International Journal of Innovative Computer, Information and Control, Vol. 5, No. 11(B), pp. 4309-4316, 2009.
[63] S. D. Lin, Y. Kuo and M. Yao, “An Image Watermarking Scheme with Tamper Detection and Recovery,” International Journal of Innovative Computer, Information and Control, Vol. 13, No. 6(A), pp. 1379-1387, 2007.
[64] S. D. Lin, J. H. Lin and C. Y. Chen, “A ROI-Base Semi-Fragile Watermarking for Image Tamper Detection and Recovery,” International Journal of Innovative Computer, Information and Control, Vol. 7, No. 12, pp. 6875-6888, 2011.
[65] T. Y. Liu, T. H. Tan and Y. L. Chu, “2D Barcode and Augmented Reality Supported English Learning System,” IEEE Conf. on Computer and Information Science, Vol. 6, pp. 5-10, 2007.
[66] N. S. Liu, G. H. Yang, D. H. Guo and L. L. Cheng, “A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences,” IEEE Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 994-998, 2008.
[67] S. Liu, H. Yao and W. Gao, “Steganalysis of Data Hiding Techniques in Wavelet Domain,” Conf. on Information Technology: Coding and Computing, pp. 1-4, 2004.
[68] K. Maeno, Q. Sun, S. F. Chang and M. Suto, “New Semi-Fragile Image Authentication Watermarking Techniques Using Random Bias and Nonuniform Quantization,” IEEE Trans. on Multimedia, Vol. 8, pp. 32-45, 2006.
[69] D. Munoz-Mejias, I. Gonzalez-Diaz and F. Diaz-de-Maria, “A Low-Complexity Pre-Processing System for Restoring Low-Quality QR Code Images,” IEEE Trans. On Consumer Electronics, Vol. 57, pp. 1320-1328, 2011.
[70] N. T. Noore and M. M. Houck, “Embedding Biometric Identifiers in 2D Barcode for Improved Security,” Computer and Security, Vol. 23, pp. 679-686, 2004.
[71] K. Pal, G. Ghosh and M. Bhattacharya, “A Comparative Study between LSB and Modified Bit Replacement (MBR) Watermarking Technique in Spatial Domain for Biomedical Security,” International Journal of Computer Applications Technology Research, Vol. 1, No. 1, pp. 30-39, 2012.
[72] S. Palmer, J. Zhang and X. Wang, “New Methods For Objective Evaluation of Fabric Pilling by Frequency Domain Image Processing,” Research Journal of Textile and Apparel, Vol. 13, No. 1, pp. 11-23, 2009.
[73] B. Patra and J. C. Patra, “CRT-Based Fragile Self-Recovery Watermarking Scheme for Image Authentication and Recovery,” IEEE Conf. on Intelligent Signal Processing and Communication System, pp. 430-435, 2012.
[74] L. Pesquer, X. Pons, A. Cortés and I. Serral, “Spatial Pattern Alterations from JPEG2000 Lossy Compression of Remote Sensing Images: Massive Variogram Analysis In High Performance Computing,” Journal of Applied Remote Sensing, Vol. 7, No. 1, pp. 073595-1-19, 2012.
[75] QR-Codes, “Information Technology. Automatic Identification and Data Capture Techniques. QR Code 2005 Bar Code Symbology Specification,” ISO/IEC 18004:2006, ISBN 978-0-580-67368-9, Apr., 2007.
[76] S. Qiang and Z. Hongbin, “Image Tamper Detection and Recovery Using Dual Watermark,” Conf. on Wireless Communications Networking and Mobile Computing, pp. 1-4, 2010.
[77] S. Qiao, M. Torkamani-Azar and K. Yoshida, “Stationary Wavelet Transform and Higher Order Statistical Analyses of Intrafascicular Nerve Recordings,” Journal of Neural Engineering, Vol. 9, No. 5, pp. 056014-1-11, 2012.
[78] A. Rani, B. Raman and S. Kumar, “A Fragile Watermarking Scheme Exploiting Neural Tree for Image Tamper Detection,” Conf. on Soft Computing for Problem Solving, Vol. 2, pp. 547-554, 2012.
[79] A. Sad and W. A. Pearlman, “A New, Fast, and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees,” IEEE Trans. on Circuit and Systems for video Technology, Vol. 6, No. 3, pp.243-250, 1996.
[80] I. W. Selesnick, R. G. Baraniuk and N. G. Kingsbury, “The Dual-Tree Complex Wavelet Transform,” IEEE Trans. on Signal Processing Magazine, Vol. 22, No.6, pp. 123-151, 2005.
[81] F. Sepehrband, M. Mortazavi and S. Ghorshi, “An Efficient Lossless Medical Image Transformation Method By Improving Prediction Model,” IEEE Conf. on Signal Processing, pp. 728-731, 2010.
[82] S. Shanmugasundaram, D. Chidambaram and B. E. Park, “Face Recognition Using Dual Tree Complex Wavelet Transform,” Conf. on Informatics and Applications, pp. 58-70, 2012.
[83] J. W. Shen, F. Pan and Y. Guo, “Digital Audio Watermark Sharing Based on the Chinese Remainder Theorem,” IEEE Conf. on Image and Signal Processing, pp. 572-576, 2012.
[84] A. V. Subramanyam, S. Emmanuel and M. S. Kankanhalli, “Robust Watermarking of Compressed and Encrypted JPEG2000 Images,” IEEE Trans. on Multimedia, Vol. 14, No. 3, pp. 703-716, 2012.
[85] S. C. Tamane and R. R. Deshmukh, “Blind 3D Model Watermarking Based on Multi-Resolution Representation and Fuzzy Logic,” International Journal of Computer Science & Information Technology, Vol. 4, No. 1, 2012.
[86] C. H. Teng, “Developing QR Code Based Augmented Reality Using SIFT Features,” Conf. on This paper appears in: Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing, pp. 985-990, 2012.
[87] N. Terzija and W. Geisselhardt, “Digital Image Watermarking Using Complex Wavelet Transform,” Conf. on Multimedia and Security, pp. 193-198, 2004.
[88] C. C. C. Tseng and S. C. Cheng, “Digital Color Image Sharpening Using Fractional Differentiation and Discrete Cosine Transform,” IEEE Conf. on Communications and Information Technologies, pp. 181-186, 2012.
[89] A. Turlikov, M. Gilmutdinov and A. Veselov, “Detecting Artifacts in Quantization Noise in Images Compresses Using Discrete Cosine Transforms,” United States Patent Application, No.US20120236932, 2012.
[90] B. Vasic, “Increasing 3D Mesh Watermark Robustness to Affine Transformations Using Barycenter as Spherical Coordinate Origin,” ETRAN, TE1.3-1-4, 2012.
[91] G. Voyatzis and I. Pitas, “Application of Toral Automorphism in Image Watermarking,” IEEE Conf. on Image Processing, Vol. 3, pp. 237-240, 1996.
[92] X. Wang and B. Hao, “Applying Blocking and Frame Grouping to Design a Robust Imperceptible Video Watermark,” Intelligent Computing Theories and Applications, Vol. 7390, pp. 593-600, 2012.
[93] H. J. Wang and C. C. J. Huo, “A Multi-Threshold Wavelet Coder (MTWC) for High Fidelity Image Compression,” IEEE Conf. on Image Processing, Vol. 1, pp. 652-655, 1997.
[94] Y. Wang and M. Vilermo, “The Modify Discrete Cosine Transform: Its Implication for Audio Coding and Error Concealment,” Journal of Audio Engineering Society, Vol. 51, No. 1, pp. 52-61, 2003.
[95] C. W. Wu, D. Coppersmith, F. C. Mintzer, C. P. Tresser and M. M. Yeung, “Fragile Imperceptible Digital Watermark with Privacy Control,” SPIE Security Watermarking Multimedia Contents, Vol. 3657, pp. 79-84, 1999.
[96] Y. Xiang, I. Natgunanathan, D. Peng and W. Zhou, “A Dual-Channel Time-Spread Echo Method for Audio Watermarking,” IEEE Trans. on Information Forensics and Security, Vol. 7, No. 2, pp. 383-392, 2012.
[97] H. Y. Yang, D. W. Bao, X. Y. Wang and P. P. Niu, “A Robust Content Based Audio Watermarking Using UDWT And Invariant Histogram,” Multimedia Tools and Applications, Vol. 57, No. 3, pp. 453-476, 2012.
[98] C. Z. Yang, L. F. Liao, X. S. Zheng, Y. L. Zhao and G. Q. Liu, “A New Video Watermark Algorithm Based on Property of the Video,” Advanced Materials Research, Vol. 532-533, pp. 1399-1402, 2012.
[99] H. Yang and A. C. C. Kot, “Pattern-Based Data Hiding for Binary Image Authentication by Connectivity,” IEEE Trans. on Multimedia, Vol. 9, No. 3, pp. 475-486, 2007.
[100] G. J. Yu, C. S. Lu and H. Y. M. Liao, “Mean Quantization-Based Fragile Watermarking for Image Authentication,” Optical Engineering, Vol. 40(7), pp. 1396-1408, 2001.
[101] O. Yun, X. Min, Y. Li and L. Xunting, “Advances in Printing and Packaging Technologies,” Applied Mechanics and Materials, Vol. 262, pp. 181-185, 2012.
[102] X. Zhang, Z. Qian, Y. Ren and G. Feng, “Watermarking with Flexible Self-Recovery Quality Based on Compressive Sensing and Compositive Reconstruction,” IEEE Trans. on Information Forensics and Security, Vol. 6, No. 4, pp. 1223-1232, 2011.
[103] T. Zhao, T. Chen, J. Xu, T. Wang and W. Shi, “Multiple Blind Watermark Algorithm Based on Wavelet Packet Transform and Two-dimensional Chaos Scramble,” Advanced Materials Research, Vol. 532-533, pp. 1846-1850, 2012.
[104] J. M. Zhong, C. H. Leung and Y. Y. Tang, “Wavelet Image Coding Based on Significance Extraction Using Morphological Operation,” IEEE Trans. on Image and Signal Processing, Vol. 146, No. 4, pp. 206-210, 1999.
[105] A. Zigomitros and C. Patsakis, “Cross Format Embedding of Metadata in Images Using QR Codes,” Conf. on Intelligent Interactive Multimedia Systems and Services, pp. 113-121, 2011.
[106] D. Zou, Y. Q. Shi, Z. Ni and W. Su, “A Semi-Fragile Lossless Digital Watermarking Scheme Based Integer Wavelet Transform,” IEEE Trans. on Circuits and system for Video Technology, Vol. 16, pp. 1294-1300, 2006.