Citations (74) J2 (12) Journal publications (9) 1. Skubalska

advertisement
Citations (74)
J2 (12)
Journal publications (9)
1. Skubalska-Rafajłowicz, E., “Estimation of horizontal and vertical translations of large images
based on columns and rows mean energy matching”, Multidimensional Systems and Signal
Processing, Vol. 25, Issue 2, pp. 273-294, 2014.
http://link.springer.com/article/10.1007%2Fs11045-013-0247-2 , Ref. [28]
2. Sudeepa, D.R.S., Hema, R., Jaiseeli, C., “Estimation of scene flow based on the warping
theory”, International Journal of Applied Engineering Research, Vol. 9, Issue 11, pp. 15411549, 2014.
http://www.scopus.com/record/display.url?eid=2-s2.084901008724&origin=resultslist&sort=plff&src=s&st1=karybali&sid=8C3170757F9384FF867E2BDC1BF1E6F3.aqHV0EoE4xlIF3hgV
WgA%3a120&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1&citeCnt=0
&searchTerm=ALL%28karybali%29 , Ref. [18]
3. Tryggestad E., Flammang A., Hales R., Herman J., Lee J., McNutt T., Roland T., Shea S.M.,
Wong J., “4D tumor centroid tracking using orthogonal 2D dynamic MRI: Implications for
radiotherapy planning”, Medical Physics, Vol. 40, Issue 9, Art. No. 091712, Sept. 2013.
http://www.scopus.com/record/display.url?eid=2-s2.084883791397&origin=resultslist&sort=plff&src=s&st1=karybali&sid=BD6A8F7E29A8565CC3F1A3148273DB2F.y7ESLndDIsN8cE7q
wvy6w%3a20&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1&citeCnt=0
&searchTerm=ALL%28karybali%29 , Ref. [39]
4. Dong Won Yang, Do Jong Kim, “A fast and efficient image registration algorithm using outlier
rejection technique based on subimage”, International Journal of Control, Automation and
Systems, Springer, Vol.11, Issue 4, pp. 790-797, Aug. 2013.
http://link.springer.com/content/pdf/10.1007%2Fs12555-011-8114-0.pdf , Ref. [21]
5. Ewa Skubalska-Rafajlowicz, “Estimation of horizontal and vertical translations of large images
based on columns and rows mean energy matching”, Multidimensional Systems and Signal
Processing, Springer, Aug. 2013.
DOI 10.1007_s11045-013-0247-2
http://link.springer.com/content/pdf/10.1007%2Fs11045-013-0247-2.pdf , Ref. [28]
6. Hao Lu, Tuanjie Liu, Haiqing Zhao, “High-accuracy band to band registration method for multispectral images of HJ-1A/B”, Journal of Electronics (China), Vol. 29, Issue 5, pp. 361-367, Sep.
2012.
http://link.springer.com/article/10.1007%2Fs11767-012-0875-y , Ref. [4]
7. Pelletier S. Cooperstock J.R., “Preconditioning for edge-preserving image super resolution”,
IEEE Transactions on Image Processing, Vol. 21, No. 1, pp. 67-79, Jan. 2012.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5898412 , Ref. [28]
8. Chen Z., Yin F., Sun F., “Registration technique for high-resolution remote sensing images
based on nonsubsampled contourlet transform”, Guangxue Xuebao/Acta Optica Sinica Vol. 29,
No. 10, pp. 2744-2750, Oct. 2009.
http://www.scopus.com/record/display.url?eid=2-s2.070449404882&origin=resultslist&sort=plf-f&cite=2-s2.01
54049119146&src=s&imp=t&sid=UVFDBRm6wL4l21Q7RU4HxKg%3a90&sot=cite&sdt=a&
sl=0&relpos=0&relpos=0 , Ref. [2]
9. Jialing Wang and Paul A. Lang, “Detection of Cypress Canopies in the Florida Panhandle Using
Subpixel Analysis and GIS”, Remote Sensing, Vol. 1, Issue 4, pp. 1028-1042, Dec. 2009.
http://www.mdpi.com/2072-4292/1/4/1028/ , Ref. [41]
Remote Sensing (ISSN 2072-4292), an Open Access journal of the science and technology of
remote sensing and the applications, is published by Molecular Diversity Preservation
International (MDPI) online monthly.
Conference publications (2)
1. Stankevich S.A., Shklyar S.V. and Tyagur V.M., “Subpixel resolution satellite imaging
technique”, Proceedings – IEEE International Conference on Digital Technologies (DT), pp. 5558, 2013.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6566286 , Ref. [1]
2. Misganu Debella-Gilo and Andreas Kääb, “Sub-pixel precision image matching for
displacement measurement of mass movements using normalised cross-correlation”,
Proceedings – ISPRS (International Society for Photogrammetry and Remote Sensing) TC VII
Symposium, IAPRS, Vol. XXXVIII, Part 7B, 2010.
http://www.isprs.org/proceedings/XXXVIII/part7/b/pdf/181_XXXVIII-part7B.pdf
MSc and PhD theses (1)
1. Stéphane Pelletier, “Acceleration methods for image super-resolution”, PhD Thesis, Department
of Electrical & Computer Engineering, McGill University, Montréal, Canada, 2009.
http://www.cim.mcgill.ca/sre/publications/thesis/2009-PHD-Pelletier.pdf , Ref. [164]
J1 (52)
Books and book chapters (5)
1. Tadeusz Michałowski, “Applications of MATLAB in Science and Engineering”, InTech, 2011,
ISBN: 978-953-307-708-6.
Chapter 22 – Novel Variance Based Spatial Domain Watermarking and its’ Comparison with
DIMA and DCT Based Watermarking Counterparts, pp. 452-468, Ref. [15].
http://www.intechopen.com/articles/show/title/novel-variance-based-spatial-domainwatermarking-and-its-comparison-with-dima-and-dct-based-watermar
2. F. Shih, “Image Processing and Pattern Recognition: Fundamentals and Techniques”, WileyIEEE Press, 2010, ISBN: 9780470590416.
Chapter 12 – Image Watermarking, pp.444-473.
http://ieeexplore.ieee.org/xpl/ebooks/bookPdfWithBanner.jsp?fileName=5559029.pdf&bkn=555
9001
3. Alan C. Bovik, “The Essential Guide to Image Processing”, Academic Press, 2009, ISBN-10:
0123744571, ISBN-13: 978-0123744579.
Chapter 22 – Image Watermarking: Techniques and Applications, pp. 597-648, Ref. [114].
http://www.amazon.com/Essential-Guide-ImageProcessing/dp/0123744571/ref=sr_1_1?ie=UTF8&s=books&qid=1256815328&sr=11#reader_0123744571
4. Ahmed Bouridane, “Imaging for Forensics and Security: From Theory to Practice”, Springer,
2009, ISBN-10: 0387095314, ISBN-13: 978-0387095318,
2
Chapter 6 – Protection of Fingerprint Data Using Watermarking, pp.117-142, Ref. [7].
http://www.amazon.com/Imaging-Forensics-Security-CommunicationTechnology/dp/0387095314/ref=sr_1_1?ie=UTF8&s=books&qid=1256816201&sr=11#reader_0387095314
5. Chang-Tsun Li, Multimedia Forensics and Security, IGI Global, 2008, ISBN-10: 1599048698,
ISBN-13: 978-1599048697
Chapter VII – Statistical Watermark Detection in the Transform Domain for Digital Images
http://books.google.gr/books?id=A1D61snlvcC&pg=PA138&lpg=PA138&dq=karybali&source=web&ots=ZAR8SZHlcV&sig=CfTBX
deDu_svSjRiVo7ODBh6d-E&hl=el&sa=X&oi=book_result&resnum=9&ct=result#PPA139,M1
Journal publications (24)
1. Alam, M.M., Vilankar, K.P., Field, D.J., Chandler, D.M., “Local masking in natural images: A
database and analysis”, Journal of Vision, Vol. 14, Issue 8, Article no. 22, pp.1-38, 2014.
http://www.journalofvision.org/content/14/8/22.full.pdf+html , Ref. [56]
2. H.Y. Leung, L.M. Cheng, F. Liu and Q.K. Fu, “Adaptive reversible data hiding on block median
preservation and modification of prediction errors”, Journal of Systems and Software, Elsevier,
Vol. 86, Issue 8, pp. 2204-2219, Aug. 2013.
http://www.sciencedirect.com/science/article/pii/S0164121213000903 , Ref. [12]
3. Damon M. Chandler, “Seven Challenges in Image Quality Assessment: Past, Present, and Future
Research,” ISRN Signal Processing, vol. 2013, Article ID 905685, 53 pages, 2013.
doi:10.1155/2013/905685
http://www.hindawi.com/isrn/signal.processing/2013/905685/ , Ref. [6]
4. Narong Mettripun, Thumrongrat Amornraksa and Edward J. Delp, “Robust image watermarking
based on luminance modification”, Journal of Electronic Imaging, SPIE, Vol. 22, Issue 3, 2013.
doi:10.1117/1.JEI.22.3.033009
http://electronicimaging.spiedigitallibrary.org/article.aspx?articleid=1727060 , Ref. [17]
5. Wang D., Li Y., Nian G.-J. and Wang K., “An inhomogeneity mask for spatial watermarking”,
Jilin Daxue Xuebao (Gongxueban) / Journal of Jilin University (Engineering and Technology
Edition) Vol. 43, Issue 3, pp. 771-775, May 2013.
http://www.scopus.com/record/display.url?eid=2-s2.084880986376&origin=resultslist&sort=plff&src=s&st1=karybali&sid=2FF8F68786F048FC27C216592CDDC1B0.WlW7NKKC52nnQNx
jqAQrlA%3a20&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1&citeCnt=
0&searchTerm=ALL%28karybali%29 , Ref. [2]
6. Mohammad Imroze Khan, Samiksha Soni, Bibhudendra Acharya, Shrish Verma,
“Implementation of digital watermarking using VHDL”, International Journal of Computer
Science & Communication, Vol. 3, No. 1, pp. 15-21, 2012.
http://www.csjournals.com/IJCSC/PDF3-2/Article_3.pdf , Ref. [8]
7. Amir Valizadeh and Z Jane Wang, “Efficient blind decoders for additive spread spectrum
embedding based data hiding”, Eurasip Journal on Advances in Signal Processing (Open
Access), 2012:88
http://link.springer.com/article/10.1186%2F1687-6180-2012-88?LI=true#page-1 , Ref. [24]
3
8. Vahedi E., Zoroofi R.A., Shiva M., “Toward a new wavelet-based watermarking approach for
color images using bio-inspired optimization principles”, Digital Signal Processing, Elsevier,
Vol. 22, No.1, pp. 153-162, Jan. 2012.
http://www.sciencedirect.com/science/article/pii/S1051200411001485 , Ref. [5]
9. Zhang F., Liu W., Lin W., Ngan K.N., “Spread spectrum image watermarking based on
perceptual quality metric”, IEEE Transactions on Image Processing, Vol. 20, No. 11, pp. 32073218, Nov. 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5754586 , Ref.[15]
10. Fakhari P., Vahedi E., Lucas C., “Protecting patient privacy from unauthorized release of
medical images using a bio-inspired wavelet-based watermarking approach”, Digital Signal
Processing, Elsevier, Vol.21, No. 3, pp. 433-446, May 2011.
http://www.sciencedirect.com/science/article/pii/S1051200411000170 , Ref. [17]
11. Nian G.-J., Liu H.-S., “Data hiding in colour image applied in certificate verification”,
International Journal of Multimedia Intelligence and Security, Inderscience Enterprises Ltd,
Vol. 2, No. 2, pp. 186-198, 2011.
http://inderscience.metapress.com/content/61k472603t73451l/
12. Nian G.-J., Liu H.-S., Wang D., Wang N.-D., “Analysis and realization of watermarking hiding
in color picture”, Jilin Daxue Xuebao (Gongxueban) / Journal of Jilin University (Engineering
and Technology Edition) Vol. 41, Issue SUPPL. 1, pp. 339-343, Jul. 2011.
http://www.scopus.com/record/display.url?eid=2-s2.080053531197&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=6YQjC1UPLhd1lOsvIf4bYa%3a30&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=8&relpo
s=8&searchTerm=ALL%28karybali%29 , Ref.[9]
13.Nian G.-J., Liu H.-S., Che X.-L., Sun X.-Y., “Prediction error filter applied in blind additive
watermarking algorithm”, Jilin Daxue Xuebao (Gongxueban) / Journal of Jilin University
(Engineering and Technology Edition), Vol. 41, No. 1, pp.249-253, Jan. 2011.
http://www.scopus.com/record/display.url?eid=2-s2.079951779030&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=OWi-YidWJmk9eEPpjzQ1_n%3a00&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1
&searchTerm=ALL%28karybali%29 , Ref. [7]
14. Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee, “Digital Cinema Watermarking for Estimating
the Position of the Pirate”, IEEE Transactions on Multimedia, Vol. 12, No. 7, pp. 605 - 621,
Nov. 2010.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5540297 , Ref. [20]
15. Kalantari N. K., Ahadi S. M., Vafadust M., “A robust image watermarking in the ridgelet
domain using universally optimum decoder”, IEEE Transactions on Circuits and Systems for
Video Technology, Vol. 20, No. 3, pp. 396-406, Mar. 2010.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5308358 , Ref. [2]
16. Oh T.-W., Lee M.-J., Kim K.-S., Lee H.-K., “Robust high-definition video watermarking based
on self-synchronizing signals against composite distortions”, Optical Engineering, SPIE, Vol.
49, No. 9, art. no. 097006, Sep. 2010.
http://www.scopus.com/record/display.url?eid=2-s2.081355132645&origin=resultslist&sort=plff&src=s&st1=karybali&sid=AzLVYQyZB93wAlryNz_B91a%3a30&sot=b&sdt=b&sl=13&s=
ALL%28karybali%29&relpos=15&relpos=15&searchTerm=ALL%28karybali%29 , Ref. [19]
17. Min-Jeong Lee, Kyung-Su Kim, Tae-Woo Oh, Hae-Yeoun Lee and Heung-Kyu Lee, “Improved
watermark synchronization based on local autocorrelation function”, Journal of Electronic
Imaging, SPIE, Vol. 18, No. 2, art. no. 023008, May 2009.
4
http://www.scopus.com/record/display.url?eid=2-s2.078149254459&origin=resultslist&sort=plff&src=s&st1=karybali&sid=PoY4fLdHaOPRHkVxCZlXFqF%3a60&sot=b&sdt=b&sl=13&s=
ALL%28karybali%29&relpos=19&relpos=19&searchTerm=ALL%28karybali%29 , Ref. [19]
18. Liu K.-C., Chou C.-H., “Robust and transparent watermarking scheme for colour images”, IET
Image Processing, Vol. 3, No. 4, pp. 228-242, 2009.
http://www.scopus.com/record/display.url?view=basic&eid=2-s2.069149091825&origin=resultslist&sort=plf-f&cite=2-s2.0-69149091825&refeid=2-s2.033744722467&src=s&imp=t&sid=qWB0e4Kq27ArV3fxwjNnZG%3a110&sot=cite&sdt=a&sl=0&relpos=0&relpos=0 , Ref. [3]
19. Damon Chandler, Matthew Gaubatz and Sheila S. Hemami, “A Patch-Based Structural Masking
Model with an Application to Compression”, Eurasip Journal on Image and Video Processing,
Art. ID: 649316, 22 pages, 2009.
http://www.hindawi.com/journals/ivp/aip.649316.html Ref. [7]
20. Jin W., Li J.-X., Yin C.-Q., “An image zero-watermarking scheme based on visual cryptography
utilizing contour-wavelet”, Guangdianzi Jiguang/Journal of Optoelectronics Laser, Vol. 20, No.
5, pp. 653-656, May 2009.
http://www.scopus.com/record/display.url?view=basic&eid=2-s2.066349103473&origin=resultslist&sort=plf-f&cite=2-s2.0-69149091825&refeid=2-s2.033744722467&src=s&imp=t&sid=qWB0e4Kq27ArV3fxwjNnZG%3a110&sot=cite&sdt=a&sl=0&relpos=2&relpos=2, Ref. [1]
21. Kyung-Su Kim, Hae-Yeoun Lee, Dong-Hyuck Im and Heung-Kyu Lee, “Practical, Real-Time,
and Robust Watermarking on the Spatial Domain for High-Definition Video Contents”, IEICE
Transactions on Information and Systems, E91-D, No. 5, pp. 1359-1368, 2008.
http://www.jstage.jst.go.jp/article/transinf/E91.D/5/E91.D_1359/_cit , Ref. [19]
22. Khalil Zebbiche, F. Khelifi, and Ahmed Bouridane, “An Efficient watermarking Technique for
the Protection of Fingerprint Images”, Eurasip Journal on Information Security, Art. ID:
918601, 20 pages, 2008.
http://www.hindawi.com/journals/is/aip.918601.html Ref. [7]
23. J. Zhong and S. Huang, “Double Sided Watermark Embedding and Detection with Perceptual
Analysis”, ArXiv e-prints, Vol. 705, 0705.1925, 2007.
http://arxiv.org/ftp/arxiv/papers/0705/0705.1925.pdf , Ref. [11]
24. Chen Kailiang, Wang Jianjun, “A Contourlet-Based Image Watermarking Algorithm Combined
with HVS”, Journal of Computer-Aided Design and Computer Graphics, Vol.19, No.6, pp.811816, 2007.
http://caod.oriprobe.com/articles/12578934/A_Contourlet_Based_Image_Watermarking_Algorit
hm_Combined_with_HVS.htm
Conference publications (18)
1. Mehan V., Dhir R., Brar Y.S., “Joint watermarking and fingerprinting approach for colored
digital images in double DCT domain”, Proceedings – IEEE International Conference on Signal
Processing Computing and Control (ISPCC), pp. 1-6, 2013.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6663390 , Ref. [5]
2. I. Orovic, N. Zaric, S. Stankovic, "An Analysis of Quantization Influence on Optimal Detection
of Multiplicative Watermark," Proceedings - 55th International Symposium ELMAR 2013,
Zadar, Croatia, Sept. 2013.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6658315 , Ref. [3]
5
3. Lai C.-C., Ko C.-H., Yeh C.-H., “An adaptive SVD-based watermarking scheme based on
genetic algorithm”, Proceedings – International Conference on Machine Learning and
Cybernetics, ICMLC 2012, Vol. 4, pp. 1546-1551, 2012.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6359595 , Ref. [6]
4. Zhang Yifeng, Jia Chengwei, Xu Zhengkang, Wang Kai, Pei Wenjiang, “Modified spreadtransform dither modulation”, Proceedings – International Conference on Wireless
Communications and Signal Processing, WCSP 2011, pp. 1-5, 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6096728 , Ref. [2]
5. Oh T.-W., Ryu S.-J., Lee H.-K., “Invisible logo watermarking using visualization of spread
spectrum signal on high definition video”, Proceedings – 7th International Symposium on Image
and Signal Processing and Analysis, ISPA 2011, pp. 218-223, 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6046609 , Ref. [11]
6. Lee M.-J., Lee J.-W., Lee H.-K., “Perceptual watermarking for 3D stereoscopic video using
depth information”, Proceedings – 7th International Conference on Intelligent Information
Hiding and Multimedia Signal Processing, IIHMSP 2011, pp. 81-84, 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6079539 , Ref. [12]
7. Wang C., Zhuang X., “A watermark scheme based on residual”, Proceedings – 2nd
International Conference on Mechanic Automation and Control Engineering, MACE 2011, pp.
4-7, 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5986843 , Ref. [5]
8. Wang C., Zhuang X., “A watermarking scheme based on digital images’ signatures”,
Proceedings – 2nd International Conference on Multimedia Technology, ICMT 2011, pp. 125127, 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6003065 , Ref. [1]
9. Nian G., Tang X., Wang D., Liu H. “Print-scan resilient data hiding scheme applied in certificate
verification”, Proceedings – 3rd International Congress on Image and Signal Processing, CISP
2010, Vol. 3, pp. 1161-1165, 2010.
http://www.scopus.com/record/display.url?eid=2-s2.078650535447&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=OWi-YidWJmk9eEPpjzQ1_n%3a00&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=2&relpos=2
&searchTerm=ALL%28karybali%29 , Ref. [5]
10. T.-W. Oh, K.-S. Kim, H.-Y. Lee, J.-W. Lee, H.-K. Lee, “Enhancing Perceptual Quality of
Watermarked High-Definition Video through Composite Mask”, Proceedings of the 2nd
International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), pp.
161-165, 2010.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5586742 , Ref. [15]
11. T.-W. Oh, S.-J. Ryu, J.-W. Lee, H.-K. Lee “Improved Watermark Estimation Scheme Based on
Neighborhood Filter”, Proceedings – 6th Int. Conf. on Intelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP-2010), pp. 55-58, 2010
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5635774 , Ref. [10]
12. Megalingam, R.K.; Nair, M.M.; Srikumar, R.; Balasubramanian, V.K.; Sarma, V.S.V.,
“Performance Comparison of Novel, Robust Spatial Domain Digital Image Watermarking with
the Conventional Frequency Domain Watermarking Techniques”, Proceedings of the 2010
International Conference on Signal Acquisition and Processing, pp. 349 - 353, 2010.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5432770 , Ref. [11]
13. Antonis Mairgiotis, Nikolaos Galatsanos, “A hierarchical spatially adaptive image model for
perceptual mask design and multiplicative watermark detection”, Proceedings of the 1st IEEE
International Workshop on Information Forensics and Security (WIFS), pp. 6-10, 2009.
6
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5386494 , Ref. [10]
14. Xinshan Zhu, “A new Spatial Perceptual Mask for Image Watermarking”, Proceedings of the
19th International Conference on Pattern Recognition, pp. 1-4, 2008.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4761640 , Ref. [3]
15. Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh and Heung-Kyu Lee, “A Practical Real-Time
Video Watermarking Scheme Robust against Downscaling Attack”, Proceedings of the 6th
International Workshop on Digital Watermarking, Vol. 5041/2008, pp. 323-334, Springer
LNCS, 2008.
http://www.springerlink.com/content/gn815822741n1ht7/fulltext.pdf, Ref. [12]
16. Samia Belkacem, Zohir Dibi and Ahmed Bouridane, “Robust Color Image Watermarking
Scheme”, Proceedings of the 4th International Conference on Computer Integrated
Manufacturing CIP΄ 2007, 2007.
http://www.univ-setif.dz/cip2007/Theme_C/Articles_C/C04.pdf, Ref. [3]
17. Samia Belkacem, Zohir Dibi and Ahmed Bouridane, “Luminance – Model for Spread Spectrum
Image Watermarking”, Proceedings of the 4th International Conference on Computer Integrated
Manufacturing CIP΄ 2007, 2007.
http://www.univ-setif.dz/cip2007/Theme_C/Articles_C/C05.pdf, Ref. [5]
18. Samia Belkacem, Zohir Dibi, Ahmed Bouridane, “A Comparative Study of DCT Image
Watermarking Algorithms”, JIG’2007 - 3èmes Journées Internationales sur l’Informatique
Graphique, 29-30 October, 2007.
http://www.umc.edu.dz/vf/proceeding/JIG2007/sessionA1/jig01szasession%20A1-01.pdf,
Ref.[3]
MSc and PhD theses (5)
1. Ying Yang, “Information analysis for Steganography and Steganalysis in 3D Polygonal
Meshes”, Ph.D. Thesis, School of Engineering and Computing Science, University of Durham,
United Kindom, 2013.
http://etheses.dur.ac.uk/8492/1/Thesis_final_YingYang.pdf?DDD10+ , Ref. [61]
2. Amir Valizadeh, “Improved spread spectrum schemes for data hiding and their security analysis
under known message attack”, Ph.D. Thesis, Electrical and Computer Engineering, The
University of British Columbia, 2013.
https://circle.ubc.ca/bitstream/handle/2429/44390/ubc_2013_fall_valizadeh_amir.pdf?sequence=
3 , Ref. [59]
3. Nicola Zaric, “Vremensko-frekvencijske distribucije sa realnim i kompleksnim argumentom
vremena: hardverske realizacije i primjena u digitalnom watermarkingu”, Ph.D. Thesis, Faculty
of Electrical Engineering, University of Montenegro, 2010.
http://www.tfsa.ac.me/pap/Nikola_PhD.pdf , Ref. [79]
4. Fan Zhang, “Research on visual distortion for information hiding”, Ph.D. Thesis, Media and
Communication Lab, Huazhong University of Science and Technology, Wuhan, P.R.China,
2008.
http://mc.eistar.net/Publications.htm#Thesis , Ref. [112]
5. Jidong Zhong, “Watermark Embedding and Detection”, PhD Thesis, Shanghai Jiaotong
University, 2007
7
http://arxiv.org/ftp/arxiv/papers/0706/0706.0427.pdf , Ref. [118]
C6 (3)
Journal publications (3)
1. Uss M.L., Vozel B., Dushepa V.A., Komjak V.A. and Chehdi K., “A precise lower bound on
image subpixel registration accuracy”, IEEE Transactions on Geoscience and Remote Sensing,
Vol. 52, No. 6, pp. 3333-3345, 2014.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6570757&url=http%3A%2F%2Fieeexpl
ore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D6570757 , Ref. [21]
2. Bian J., Men C. Li X. Li J., “Multiscale-based stereo matching method for small baselines”,
Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol. 40,
Issue 7, pp. 62-66, Jul. 2012.
http://www.scopus.com/record/display.url?eid=2-s2.084865827488&origin=resultslist&sort=plff&src=s&st1=karybali&sid=8D5FED3454CFB71C2A5CC6F1FA96F347.N5T5nM1aaTEF8rE6
yKCR3A%3a20&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=2&relpos=2&searchT
erm=ALL%28karybali%29 , Ref. [14]
3. G. K. Stylios, “International textile and clothing research register”, International Journal of
Clothing Science and Technology, Vol. 18, No. 6, pp. 1-80, 2006, Emerald Group Publishing
Limited.
http://www.ingentaconnect.com/content/mcb/058/2007/00000019/00000006/art00001
C5 (2)
Conference publications (2)
1. Sutunc, M. Keskinoz, M. Karabat, C., “Improving the performance of wavelet domain spread
spectrum watermarking systems using space-time block codes”, Proceedings of the 17th IEEE
Signal Processing and Communications Applications Conference, pp. 484-487, 2009.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5136438&isnumber=5136316 , Ref.
[3]
2. C. Karabat, “Space Time Block Coding for Spread Spectrum Watermarking Systems”,
Proceedings of the 7th International Workshop on Digital Watermarking, Vol. 5450/2009, pp.
266-277, Springer LNCS, 2009.
http://www.springerlink.com/content/d228420105l273h1/fulltext.pdf , Ref. [5]
C4 (1)
Journal publications (1)
1. Zeki A.M., Manaf A.A., Ibrahim A.A., Zamani M., “A robust watermark embedding in smooth
areas”, Research Journal on Information Technology, Vol. 3, No. 2, pp. 123-131, 2011.
http://www.scopus.com/record/display.url?eid=2-s2.080054778168&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=6YQjC1UPLhd1lOsvIf4bYa%3a30&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=6&relpo
s=6&searchTerm=ALL%28karybali%29 , Ref. [15]
8
C3 (4)
Journal publications (2)
1. Ling Jie, Liu Ju, Sun Jian-de, Sun Xing-hua, “Visual Model Based Iterative AQIM Watermark
Algorithm”, Acta Electronica Sinica, Vol. 38, No.1, pp. 151-155, 2010.
http://www.docin.com/p-50418358.html , Ref. [5]
2. Peng Qiu-Ming, Yang Xia-Fan, Huang Song, Li Si-Jing, Bai Sen, “A Novel Adaptive Blind
Digital Watermarking Algorithm”, Computer Science, Vol. 32, No. 8, pp.63-66, 2005.
http://caod.oriprobe.com/articles/9607667/A_Novel_Adaptive_Blind_Digital_Watermarking_Al
gorithm.htm , Ref. [12]
Conference publications (1)
1.
Yifeng Zhang, Chengwei Jia, Zhengkang Xu, Kai Wang and Wenjiang Pei “Modified spreadtransform dither modulation”, Proceedings of the Wireless Communications and Signal
Processing (WCSP) Conference, pp. 1-5, 2011.
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6096728 , Ref. [2]
MSc and PhD theses (1)
1. Chen-Husan Tasi, “An Image Error Detection and Error Concealment Scheme based on
Interleaving Prediction and Block Direction Hiding”, MSc Thesis, Graduate Institute of
Information Management, Chaoyang University of Technology, Taiwan, 2006.
http://ethesys.lib.cyut.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0710106-063357 , Ref.
[12]
9
Download