Introduction:
Methods:
Conclusion:
Contacts:
|
Conclusion
References
Images used in this project were obtained from USC-SIPI Image Database
(http://sipi.usc.edu/database). The test images used were "Lenna", "Baboon
(Mandrill)", "House", and "Peppers."
- "Computation of SNR and PSNR,"
http://bmrc.berkeley.edu/courseware/cs294/fall97/assignment/psnr.html
- Cox, I., et al. "Secure Spread Spectrum Watermarking for Multimedia,"
IEEE Trans. on Image Processing, vol. 6, no. 12, pp. 1673-1687.
- "Examples of using AiS Watermark Pictures Protector,"
http://www.watermarker.com/watermark-protector/watermark-examples.aspx
- Johnson, N. F. and Jajodia S. "Exploring Steganography: Seeing the
Unseen," IEEE COMPUTER, vol. 31, no. 2, pp. 26-35, 1998.
- Hirohia, H. "A Data Embedding Method Using BPCS Principle With New
Complexity Measures," Kyoto University, Japan.
- Niimi, M., et al. "Intensity Histogram Steganalysis
in BPCS-Steganography," Proc. of the SPIE, vol 3413. pp. 555-564, August 2001.
- "Peak Signal-to-noise ratio," http://en.wikipedia.org/wiki/PSNR
- "Plausibility--The Invention of Secret Electronic Communication,"
http://godel.ph.utexas.edu/~tonyr/spread_spectrum.html.
- Podilchuk, C. I. and Zeng, W.. "Image-Adaptive Watermarking Using
Visual Models," IEEE Journal on Selected Areas in Comm., vol 16, no. 4,
pp. 525-539, May 1998.
- Wolfgang, R. B., Podilchuk C. I., and Delp, E. J. "Perceptual Watermarks
for Digital Images and Video," Proc. of the IEEE, vol. 87, no. 7,
pp. 1108-1126, July 1999.
- "Watermark," http://en.wikipedia.org/wiki/Watermark
- Watson, A. B. "DCT quantization matrices visually optimized for
individual images," Proc. of the SPIE, vol 1913. pp. 202-216, Feb. 1993.
|