References
1. B. B. Zhu, M D. Swanson, and A. H. Tewfik, “When seeing isn’t believing,” IEEE Signal
Proceeding Magazine, March, 2004.
2. P. Sagetong and W. Zhou, “Dynamic Wavelet Feature-based Watermarking for Copyright
Tracking in Digital Movie Distribution Systems,” the IEEE International Conference of
Imaging Processing, Rochester, NY, September, 2002.
3. W. Zhou, T. Rockwood and P. Sagetong, “Non-repudiation Oblivious Watermarking
Schema for Secure Digital Video Distribution,” the IEEE International Workingshop for
Signal Processing, Virgin Island, December, 2002.
4. W. Diffle and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. on Infor-
mation Theory, Vol. 22, No. 6, pp-644-654, Nov 1976.
5. B. Zhu, M.D. Swanson, and A.H. Tewfik, “A transparent authentication and distortion
measurement technique for images,” in Proc. 7
th
IEEE Digital Signal Processing Work-
shop, Loen, Norway, Sept. 1996, pp. 45–48.
6. M. Schneider and S.-F. Chang, “A robust content based digital signature for image authen-
tication,” in Proc. IEEE Int. Conf. Image Processing, 1996, vol. 3, pp. 227–230.
7. D.-C. Lou and J.-L. Liu, “Fault resilient and compression tolerant digital signature for
image authentication,” IEEE Trans. Consumer Electron., vol. 46, no. 1, pp. 31–39, 2000.
8. M.P. Queluz, “Content-based integrity protection of digital images,” in Proc. SPIE Conf.
Security Watermarking Multimedia Contents, Jan. 1999, vol. 3657, pp. 85–93.
9. J. Dittmann, A. Steinmetz, and R. Steinmetz, “Content-based digital signature for motion
pictures authentication and content-fragile watermarking,” IEEE Int. Conf. Multimedia
Computing and Systems, 1999, vol. 2, pp. 209–213.
10. C.-T. Li, D.-C. Lou, and T.-H. Chen, “Image authentication and integrity verification via
content-based watermarks and a public key cryptosystem,” in Proc. IEEE Int. Conf. Image
Processing, 2000, vol. 3, pp. 694–697.
10. S. Bhattacharjee and M. Kutter, “Compression tolerant image authentication,” in Proc.
IEEE Int. Conf. Image Processing, 1998, vol. 1, pp. 435–439.
11. Chai Wah Wu. On the design of content-based multimedia authentication systems. IEEE
Transaction on Multimedia, Vol. 4, No. 3, September, 2002.
12. F. Bartolini, A. Tefas, M. Barni and I. Pitas. Image Authentication Techniques for Sur-
veillance Applications. Proceedings of the IEEE, Vol. 89, No. 10, October, 2001.
13. Turk, M., and Pentland, A. Face recognition using Eigenfaces. In
Proceedings of the
IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR)
(June 1991), pp. 586-591.
14. D. Bolme, R. Beveridge, M. T., and Draper, B. The CSU face identifichation evaluation
system: Its purpose, features and structure. In
International Conference on Vision Systems
(April 2003), pp. 304-311.
15. G. Arce L. Xie. “A joint wavelet compression and authentication watermarking,” In IEEE
International Conference on Image Processing, Chicago, IL, Oct 1998.
16. G. R. Arce L. Xie, “A blind wavelet based digital signature for image authentication,”
Proceedings of the EUSIPCO-98, Sept. 1998.
17. G. R. Arce L. Xie. “A blind content based digital image signature,” Proceedings of the 2nd
Annual Fedlab Symposium on ATIRP, Feb. 1998.
21