PSYCH221: A survey of digital watermarking techniques      
Itai Katz, March 2006
           

Introduction: Methods: Conclusion: Contacts:

Conclusion
References
Images used in this project were obtained from USC-SIPI Image Database (http://sipi.usc.edu/database). The test images used were "Lenna", "Baboon (Mandrill)", "House", and "Peppers."
  1. "Computation of SNR and PSNR," http://bmrc.berkeley.edu/courseware/cs294/fall97/assignment/psnr.html
  2. Cox, I., et al. "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, vol. 6, no. 12, pp. 1673-1687.
  3. "Examples of using AiS Watermark Pictures Protector," http://www.watermarker.com/watermark-protector/watermark-examples.aspx
  4. Johnson, N. F. and Jajodia S. "Exploring Steganography: Seeing the Unseen," IEEE COMPUTER, vol. 31, no. 2, pp. 26-35, 1998.
  5. Hirohia, H. "A Data Embedding Method Using BPCS Principle With New Complexity Measures," Kyoto University, Japan.
  6. Niimi, M., et al. "Intensity Histogram Steganalysis in BPCS-Steganography," Proc. of the SPIE, vol 3413. pp. 555-564, August 2001.
  7. "Peak Signal-to-noise ratio," http://en.wikipedia.org/wiki/PSNR
  8. "Plausibility--The Invention of Secret Electronic Communication," http://godel.ph.utexas.edu/~tonyr/spread_spectrum.html.
  9. Podilchuk, C. I. and Zeng, W.. "Image-Adaptive Watermarking Using Visual Models," IEEE Journal on Selected Areas in Comm., vol 16, no. 4, pp. 525-539, May 1998.
  10. Wolfgang, R. B., Podilchuk C. I., and Delp, E. J. "Perceptual Watermarks for Digital Images and Video," Proc. of the IEEE, vol. 87, no. 7, pp. 1108-1126, July 1999.
  11. "Watermark," http://en.wikipedia.org/wiki/Watermark
  12. Watson, A. B. "DCT quantization matrices visually optimized for individual images," Proc. of the SPIE, vol 1913. pp. 202-216, Feb. 1993.