簡易檢索 / 詳目顯示

研究生: 史明哲
Didi - Rosiyadi
論文名稱: A Variety of Digital Image Watermarking Schemes for e-Government Document Images
A Variety of Digital Image Watermarking Schemes for e-Government Document Images
指導教授: 洪西進
Shi-Jinn Horng
口試委員: 李祖添
-
辛錫進
-
廖弘源
-
曾煜棋
-
詹寶珠
-
郭景明
-
鍾國亮
-
學位類別: 博士
Doctor
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2013
畢業學年度: 102
語文別: 英文
論文頁數: 128
中文關鍵詞: VarietyWatermarkingE-government Document ImagesDiscrete Cosine TransformSingular Value DecompositionGenetic Algorithm
外文關鍵詞: Variety, Watermarking, E-government Document Images, Discrete Cosine Transform, Singular Value Decomposition, Genetic Algorithm
相關次數: 點閱:236下載:7
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

  • In this dissertation, a variety of digital image watermarking scheme for e-government document images is proposed. A variety of copyright protection schemes is composed of the following four proposed schemes: (1) an efficient copyright protection scheme for e-government document images, (2) a blind image copyright protection scheme for e-government, (3) an adaptive watermarking scheme for e-government document images, (4) an authentication watermarking scheme for printed e-government document images and (5) a comparison between the hybrid using genetic algorithm and the pure hybrid watermarking scheme.
    Experiment results for the first scheme to the fifth one show that the performance of the proposed scheme outperforms those of existing schemes, and demonstrate that the proposed method outperforms other existing methods under several types of attacks. In addition, the results show that the improved adaptive performance of the proposed scheme is resistant to several types of attacks in comparison with the previous schemes and show the best extracted watermark quality of hybrid DCT-SVD between the hybrid using genetic algorithm and pure hybrid DCT-SVD, respectively.

    Abstract ………………………………………………………………………........i Acknowledgement ………………………………………………………………...ii Table of Content ……………….………………………………………………….iii List of Figures …………………………………………………….……………….vi List of Tables ……….……………………………………………………………..viii Chapter 1Introduction ………………………………………...………………1 Chapter 2Preliminaries ………………………………….……………………6 2.1 Genetic Algorithm (GA) ……….……………………………………………...6 2.2 Discrete Cosine Transform and Singular Value Decomposition ……………...7 2.3 Space Filling Curve (SFC) …………………….…………………………........8 2.4 Human Visual System (HVS) ………………….……………………………...9 2.5 E-Government Information Security ………………………………………….10 Chapter 3An Efficient Copyright Protection Scheme For E-government document images …….......................................................................12 3.1 Introduction ………………………………………………………………........12 3.2 The Proposed Watermarking Technique ……………………………………...14 3.2.1 Watermarking Embedding process….…………...……………………..15 3.2.2 Watermarking Extraction process………………………………………17 3.2.3 Optimization Process using Genetic Algorithm ………………………..19 3.3 Experimental Results ………………………………………………………….25 Chapter 4A blind image copyright protection scheme for e-government…..34 4.1 Introduction ………………………………………………………………........34 4.2 Related Works ……………………………………………………………........35 4.3 The Proposed Watermarking Scheme ……………………………………........40 4.3.1 Watermarking Embedding Process……………………………………..42 4.3.2 Watermarking Extraction Process …...…………………………………46 4.3.3 Optimization Process based on Genetic Algorithm ……………...……47 4.4 Experimental Results …………………………………………………………49 4.4.1 The results of proposed scheme ………………………………………51 4.4.2 The Proposed scheme in comparison to other related watermarking schemes ………………………………………………………………………53 Chapter 5An adaptive watermarking scheme for e-government document images……………………………………………...........55 5.1Introduction ……………………...……………………………………….........55 5.2 Proposed Scheme …………………………………...........................................60 5.2.1 The luminance masking based on HVS .……………………...………..63 5.2.2 Watermark Embedding Process …....…………………………………..64 5.2.3 Watermark Extraction Process …...………….…………………………66 5.2.4 Optimization process by GA …………………………………………...67 5.2.5 The objective function of proposed scheme ……………………………69 5.3 Experimental Results ………………………………………………………….69 5.3.1 Experiment Setup ………………………………………………………69 5.3.2 Experiment Results of the Proposed Scheme …………………………..71 5.3.3 Comparison with Other Techniques ………………………………........73 Chapter 6An Authentication Watermarking Scheme for Printed E-government Document Images …………………………................75 6.1 Introduction ………………………………………………………………........75 6.2 Proposed Scheme ………………………………………………………...........79 6.2.1 The normalization method ……………………………………………79 6.2.2The watermark embedding process …………......................................80 6.2.3The watermark extraction process …………........................................82 6.3 Experimental Results ………………………………………………………….85 Chapter 7A Comparison between the Hybrid using Genetic Algorithm and the pure Hybrid Watermarking Scheme …………………………..91 7.1 Introduction ……………………………………………………………………91 7.2 The Proposed Method ….………………………………………………...........92 7.3 Experimental Results ………………………………………………………….96 Chapter 8Conclusion …...……………………………………………………..101 References …………….…………………………………………………………...104

    [1]Xiaoyuan Zhang, Guoqiang Han, Kun Zou, Wen Li and Bin Li, “An effective mechanism based on watermark for e-government information security”, Proc. IEEE Int’l Con. Convergence Information Technology, Nov. 2007, pp.580-585.
    [2]Veysel Aslantas, “An SVD based digital image watermarking using genetic algorithm,” Proc. IEEE 9th Int’l Symposium Signal Processing and Its Applications (ISSPA 2007), Feb. 2007, pp.1-4.
    [3]Zhe-Ming Lu, Hong-Yi Zheng, Ji-Wu Huang, “A digital watermarking scheme based on DCT and SVD,” Proc. IEEE. The 3rd Int’l Con. International Information Hiding and Multimedia Signal Processing (IIHMSP 2007), volume 01, Nov. 2007, pp.241-244.
    [4]Andrew B. Watson, “Image compression using the discrete osine transform,” NASA Ames Research Center, Mathematic Journal, Volume 4, Issue 1, 1994, pp. 81-88.
    [5]Mei Jiansheng, Li Sukang and Tan Xiaomei, “A digital watermarking algorithm based on DCT and DWT,” International Symposium on Web Information Systems and Applications, China, 2009, pp. 104-107.
    [6] Chang, C., Tsai, P., and Lin, C., “SVD-based digital image watermarking scheme pattern,” Pattern Recognition Letters, Volume 26, Issue 10, July 2005, pp. 1577-1586.
    [7]Guo-rui Feng , Ling-ge Jiang, Chen He, Yi Xue, “Chaotic spread spectrum watermark of optimal space-filling curves,” Chaos, Solitons & Fractals, Volume 27, Issue 3, February 2006, pp. 580-587.
    [8]Yang-I Tung, “Genetic Algorithm”, Application of Computational Intelligence in Engineering course, National Taiwan University of Science and Technology, Taiwan, 2009.
    [9]Alexander Sverdlov, Scott Dexter and Ahmet M. Eskicioglu, “Secure DCT-SVD domain image watermarking: embedding data in all frequencies,” http://brooklyn-cuny.academia.edu/ScottDexter/Papers/265184/, Department CIS Broklyn college, NY, USA.
    [10]W. H. Lin, S. J. Horng, T. W. Kao, P. Fan, C. L. Lee and Y. Pan, “An efficient watermarking method based on significant difference of Wavelet coefficient quantization,” IEEE Transactions on Multimedia, Vol. 10, No. 5, August 2008, pp. 746-757.
    [11]W. H. Lin, S. J. Horng, T. W. Kao, R. J. Chen, Y. H. Chen, C. L. Lee, and T. Terano, “Image copyright protection with forward error correction,” Expert Systems with Applications, Vol. 36, Issue 9, Nov. 2009, pp. 11888-11894.
    [12]Wei-Hung. Lin, Yuh-Rau Wang, Shi-Jinn Horng, and Yi Pan, “A blind watermarking method using maximum wavelet coefficient quantization,” Expert Systems with Applications, Vol. 36, Issue 9, Nov. 2009, pp. 11509-11516.
    [13]Xiaohu Ma, XiaofengShen, “A Novel Blind Grayscale Watermark Algorithm Based on SVD,”Proceeding of International Conference on Audio, Language and Image Processing (ICALIP), Shanghai, 2008, pp. 1063-1068.
    [14]Makhloghi, M., Akhlaghian, F., Danyali, H.,“Robust Digital Image Watermarking Using Singular Value Decomposition,” IEEE International Symposium on Signal Processing and Information Technology,December 2010, pp. 219-224.
    [15]Shengjun Xue; Xuan Teng; Adaptive Blind Watermarking Based on Improved Noise Sensitivity, Fourth International Conference on Fuzzy Systems and Knowledge Discovery, volume 4, pp. 731 – 734, 2007.
    [16]Barni, M.; Bartolini, F.; Piva, A.; Improved wavelet-based watermarking through pixel-wise masking , IEEE Transactions on Image Processing, Volume: 10 , Issue: 5 , pp. 783 – 791, 2001
    [17]Lim Siong Boon, Human Visual System, http://www.siongboon.com/projects/2010-08-22/electronicballast/HumanVisualSystem.pdf, 2010.
    [18]Himanshu, H.; Rawat, S.; Raman, B.; Bhatnagar, G.; DCT and SVD Based New Watermarking Scheme, 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), pp. 146 – 151, Jan 2011
    [19]Cui, L.; Li, W. Adaptive Multiwavelet-Based Watermarking Through JPW Masking , IEEE Transactions on Image Processing, Volume: 20 , Issue: 4 , pp. 1047 - 1060 , April 2011
    [20]Fan Zhao ; Guizhong Liu ; Feifei Ren ; Adaptive Blind Watermarking for JPEG2000 Compression Domain, 2nd International Congress on Image and Signal Processing, pp. 1, October 2009
    [21]Xiaoyuan Zhang, Guoqiang Han, Kun Zou, Wen Li and Bin Li, An effective mechanism based on watermark for e-government information security, International Conference on Convergence Information Technology- IEEE, 0-7695-3038-9/07, 2007.
    [22]White, G.B, Jones, S, Minitrack, E-Government information security, System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on, E-ISBN: 0-7695-2755-8, pp. 97-97, Jan. 2007.
    [23]Jiaju Wang, Design of e-government security system based on information security model, Information Management, Innovation Management and Industrial Engineering, Volume: 2, ISBN: 978-0-7695-3435-0, pp. 359-362, 19-21 Dec. 2008.
    [24]Huayin Si and Chang-Tsun Li, Maintaining information security in e-government through steganology, Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK.
    [25]Dilip Kumar Sharma, Vinay Kumar Pathak, G.P. Sahu, Digital watermarking for secure e-government framework, Computer society India, pp. 182-191, 2007.
    [26]KinTak U, ShengDun Hu, Dongxu Qi, Zesheng Tang, “A robust image watermarking algorithm based on non-uniform rectangular partition and DCT-SVD,” Proc. IEEE. Int’l Conf. Measuring Technology and Mechatronics Automation, March 2010, pp. 327-337.
    [27]Alexander Sverdlov, Scott Dexter, Ahmet M. Eskicioglu, “Robust DCT-SVD domain image watermarking for copyright protection: embedding data in all frequencies,” Proc. the 13th European Signal Processing Conference (EUSIPCO2005), Antalya, Turkey, September 2005.
    [28]Liang Peng Wang, Genetic Watermark Embedding Based On Wavelet, Master Thesis, National Cheng Kung University, Taiwan, 2004.
    [29]Heri Prasetyo, The Reliable SVD Scheme Image Watermarking, Master Thesis, National Taiwan University of Science and Technology, Taiwan, 2009.
    [30]Alessandro Basso, Francesco Bergadano, Davide Cavagnino, Victor Pomponiu and Annamaria Vernone, “A novel block-based watermarking scheme using the SVD transform,” Algorithms Journal, Volume 2, Issue 1, January 2009, pp. 46-75.
    [31]Chih-Chin Lai, Hsiang-Cheh Huang, Cheng-Chih Tsai, (2008) Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IEEE-978-0-7695-3278-3, pp. 469-472.
    [32]Didi Rosiyadi, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan, and Yi, Pan, (2012) An Efficient Copyright Protection Scheme for e-government Document Images, IEEE Multimedia, Volume 19, No. 3, PP. 62-73.
    [33]Feng Liu, Ke Han, Chang Zheng Wang, (2009) A Novel Blind Watermark Algorithm Based on SVD and DCT, Proceeding of IEEE International Conference on Intelligent Computing and Intelligent Systems ( ICIS), Shanghai, pp. 283-286.
    [34]Kyung-Su Kim, Min-Jeong Lee, and Heung-Kyu Lee, (2008) Blind Image Watermarking Scheme in DWT-SVD Domain, Proceeding of Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), Kaohsiung , pp. 477-480.
    [35]Modaghegh, H., Khosravi, R., H., Akbarzadeh-T, (2009) A New Adjustable Blind Watermarking Based on GA and SVD, Proceeding of International Conference on Innovations in Information Technology (IIT’09), Al Ain, pp. 6-10.
    [36]Wang Hui-Qin, Zhao Min, (2010) A Blind Watermarking Algorithm for Color Image Based on Singular Value Quantization, Digital Content, Proceeding of 6th International Conference on Multimedia Technology and its Applications (IDC), Seoul, pp. 59-62.
    [37]Ming Tong, Wei Feng, HongbingJi, (2008) A Robust Geometrical Attack Resistant Digital Image Watermarking Based on Fast ICA Algorithm, Congress on Image and Signal Processing (CISP), China, pp.655-659.
    [38]Zhao, X., Ho, A.T.S., (2010) An Introduction to Robust Transform Based Image Watermarking Techniques, Intelligent Multimedia Analysis for Security Applications, Springer, pp.337-364.
    [39]H. Y. Leung, L. M. Cheng, (2011) Robust Blind Watermarking Scheme Using Wave Atoms, Lecture Notes in Computer Science, 2011, Volume 6526, pp. 148-158.
    [40]Xinge You, Liang Du, Yiu-ming Cheung, Qiuhui Chen, (2010) A Blind Watermarking Scheme Using New Nontensor Product Wavelet Filter Banks, IEEE Transaction on Image Processing, Vol. 19, No. 12, pp. 3271-3284.
    [41]Agarwal, P., and Prabhakaran, B., (2009) Robust Blind Watermarking of Point-Sampled Geometry, IEEE Transaction on Information Forensics and Security, Vol. 4, No. 1, pp. 36-48.
    [42]Amiri MD, Danyali H, Zahir-Azami B (2010) An adaptive robust and multiresolution image watermarking for progressive wavelet image coding, 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM). pp 1
    [43]Bao P, Ma X (2005) Image adaptive watermarking using wavelet domain singular value decomposition. IEEE Trans Circuits Syst Video Technol 15(1):96–102
    [44]Belkacem S, Dibi Z, Bouridane A (2007) A masking model of HVS for image watermaking in the DCT domain. IEEE Int Conf Electron, Circ Syst: 330
    [45]Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. J Inf Hiding Multimedia Signal Process 4(1):9–18
    [46]Carballeira P (2012) Analysis of pixel-mapping rounding on geometric distortion as a prediction for view synthesis distortion, Proceeding of 3DTV-Conference: the true vision - capture, transmission and display of 3D video (3DTV-CON) 2012, pp 1–4
    [47]Coello Coello CA, Toscano Pulido G (2001) A micro-genetic algorithm for multi objective optimization. Proc Genet Evolut Comput Conf
    [48]Genetic Algorithms http://www.cs.ucc.ie/~dgb/courses/tai/notes/handout12.pdf
    [49]He X, Chang S (2011) An adaptive image watermarking algorithm based on neural network. Int Conf Intell Comput Technol Autom 2:408
    [50]Hoi-Yu Tong H (1997) A perceptually adaptive JPEG coder, master thesis, University of Toronto
    [51]Huang HC, Chen YH (2009) Genetic fingerprinting for copyright protection of multicast media. Soft Comput 13(4):383–391
    [52]Huang HC, Chu CM, Pan JS (2009) The optimized copyright protection system with genetic watermarking. Soft Comput 13(4):333–343
    [53]Huang C-H,Wu J-L (2000) A watermark optimization technique based on genetic algorithms. Proc SPIE 3971
    [54]Kang X, Huang J, Zeng W (2008) Improving robustness of quantization-based image watermarking via adaptive receiver. IEEE Trans Multimedia 10(6):953–959
    [55]Kumar Sharma D, Kumar Pathak V, Sahu GP (2007) Digital watermarking for secure e-government framework Computer Society India, pp 182–191
    [56]Kuo S-s, Johnston JD (2002) Spatial noise shaping based on human visual sensitivity and its application to image coding. IEEE Trans Image Process 11(5):509–517
    [57]Lai CC, Huang HC, Tsai CC (2009) A digital watermarking scheme based on singular value decomposition and micro-genetic algorithm. Int J Innov Comput Inf Control 5(7):1867–1873
    [58]Li Q, Yuan C, Zhong Y-Z (2007) Adaptive DWT-SVD domain image watermarking using human visual model. Int Conf Adv Commun Technol 3:1947
    [59]Lim SB (2010) Human visual system, http://www.siongboon.com/projects/2010-08-22/electronicballast/HumanVisualSystem.pdf
    [60]Mairgiotis AK, Galatsanos NP (2008) New additive watermark detectors based on a hierarchical spatially adaptive image model. IEEE Trans Inf For Sec 3(1):29–37
    [61]Naiss I (2013) Computable bounds for rate distortion with feed forward for stationary and ergodic sources. IEEE Trans Inf Theory 59(2):760–781
    [62]Pappas TN, Safranek RJ, Chen J (2005) Perceptual criteria for image quality evaluation. In: Bovik AC (ed) Hand book of image and video processing, 2nd edn. Academic Press , San Diego, United States of America
    [63]Si H, Li C-T Maintaining information security in e-government through steganology, Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK
    [64]Sing K (2011) edge detector, http://yumnamkirani.hpage.us/edge_detection_74376639.html
    [65]Verma A, Tapaswi S (2009) A novel reversible visible watermarking technique for images using Noise Sensitive Region Based Watermark Embedding (NSRBWE) approach, IEEE EUROCON ‘09, pp 1374
    [66]Voloshynovskiy S, Pereira S, Pun T, Eggers JJ, Su JK (2001) Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE Commun Mag 39(8):118–126
    [67]Wang J (2008) Design of e-government security system based on information security model. Inf Manag, Innov Manag Ind Eng 2: 359–362, ISBN: 978-0-7695-3435-0, 19–21
    [68]Xue S, Teng X (2007) Adaptive blind watermarking based on improved noise sensitivity. Fourth Int Conf Fuzzy Syst Knowl Discov 4:731–734
    [69]Yan Y, Wei C, Li S (2009) Block-based adaptive image watermarking scheme using just noticeable difference. IEEE Int Work Imaging Syst Tech: 377–380
    [70]Zhao F, Liu G, Ren F (2009) Adaptive blind watermarking for JPEG2000 compression domain, 2nd International Congress on Image and Signal Processing, pp 1
    [71]Zhu S-m, Liu J-m (2008) Adaptive watermarking scheme in hybrid DWT-DCT transform based on human visual system. Int Symp Knowl Acquis Model: 668
    [72]Sheng Huang and Jian Kang Wu, Optical Watermarking for Printed Document Authentication, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 2, pp. 164-173, June 2007.
    [73]Afrakhteh, M. ; Ibrahim, S. ; Salleh, M, .Printed Document Authentication Using Watermarking Technique, Second International Conference on Computational Intelligence, Modelling and Simulation, pp.367, September 2010.
    [74]Ibrahim, S. ; Afrakhteh, M. ; Salleh, M., Adaptive watermarking for printed document authentication, 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 611, December 2010.
    [75]Kaushal Solanki, Upamanyu Madhow, B. S. Manjunath, Shiv Chandrasekaran, and Ibrahim El-Khalil, Print and Scan’ Resilient Data Hiding in Images, IEEE IEEE Transactions on Information Forensics and Security, Vol. 1, No. 4, pp. 464-478, December 2006
    [76]Guangyu Zhu, Yefeng Zheng, David Doermann, and Stefan Jaeger, Signature Detection and Matching for Document Image Retrieval, IEEE Transactions on Pattern Anaysis and Machine Intelligence, Vol. 31, No. 11, pp. 2015-2030, November 2009.
    [77]Blackledge, Jonathan; Coyle, Eugene; Information hiding by stochastic diffusion and its application to printed document authentication, IET Irish Signals and Systems Conference, pp. 1 – 6, June 2009.
    [78]Ming Jiang ; Wong, E.K. ; Memon, N. ; Robust Document Image Authentication, IEEE International Conference on Multimedia and Expo, pp. 1131, July 2007.
    [79]Paulo Vinicius Koerich Borges, Joceli Mayer , Text luminance modulation for hardcopy watermarking, Signal Processing, Volume 87, Issue 7, July 2007, pp. 1754-1771
    [80]A. Keskinarkaus, A. Pramila, T. Seppanen, Image watermarking with a directed periodic pattern to embed multibit messages resilient to print-scan and compound attacks, Journal of Systems and Software, Volume 83, Issue 10, October 2010, pp 1715-1725
    [81]S. Voloshynovskiy, O. Koval, F. Deguillaume, T. Pun, Quality enhancement of printed-and-scanned images using distributed coding, Signal Processing, Volume 87, Issue 6, June 2007, pp. 1301-1313
    [82]Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, A secure and improved self-embedding algorithm to combat digital document forgery, Signal Processing, Volume 89, Issue 12, December 2009, pp 2324-2332
    [83]Thongkor, K., Improved watermark extraction for printed and scanned watermarked document, International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS), 7-9 Dec. 2011, pp. 1 – 6
    [84]Xiangui Kang, Xiong Zhong , Jiwu Huang , Wenjun Zeng, An efficient print-scanning resilient data hiding scheme based on a novel LPM, 15th IEEE International Conference on Image Processing, 12-15 Oct. 2008, pp. 2080 - 2083
    [85]Xiangui Kang, Jiwu Huang, Wenjun Zeng, Efficient General Print-Scanning Resilient Data Hiding Based on Uniform Log-Polar Mapping, IEEE Transactions on Information Forensics and Security, volume: 5, issue : 1, pp. 1 – 12, March 2010
    [86]Martin-Rodriguez, Fernandez-Montenegro, SWAD: Secure watermarking for authentication of scanned documents, 50th FITCE Congress (FITCE), Sept. 2011,
    pp. 1 – 5
    [87]Hrishikesh, Shefali, Printed Document Watermarking Using Phase Modulation, 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), Dec. 2009, pp. 222 – 227
    [88]Chun-Hsiang Huang, Ja-Ling Wu, “A Watermark Optimization Technique Based on Genetic Algorithms,” in Proc. SPIE Visual Communications and Image Processing Vol. 3971, 2000.
    [89]F. H. Huang, Z.H. Guan, “A Hybrid SVD-DCT Watermarking Method Based on LPSNR,” Pattern Recognition Letter, pp.1769-1775, 2004.
    [90]John Holland, Adaptation in Natural and Artificial Systems, MIT press, Bradford Book Editions, Cambridge, Massachussetts, London, England, 1975.
    [91]David Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, addison, wisely publishing company, 1989.
    [92]Zaghetto, A. ; de Queiroz, R.L. , Scanned Document Compression Using Block-Based Hybrid Video Codec, IEEE Transactions on Image Processing, Volume: 22 , Issue: 6, 2013 , Page(s): 2420 - 2428
    [93]Hyung Il Koo, Segmentation and Rectification of Pictures in the Camera-Captured Images of Printed Documents, IEEE Transactions on Multimedia, Volume: 15 , Issue: 3, 2013 , Page(s): 647 - 660
    [94]Ntirogiannis, K. ; Gatos, B. ; Pratikakis, I. , Performance Evaluation Methodology for Historical Document Image Binarization , IEEE Transactions on Image Processing, Volume 22, Issue: 2, 2013, Pages(s): 595-609.
    [95]Shi-Jinn Horng, Didi Rosiyadi, Tianrui Li, Terano Takao, Minyi Guo, Muhammad Khurram Khan, 2013: "A blind image copyright protection scheme for e-government", International Journal of JVCI-Elsevier Pg.62-73, Vol. 19, No. 3, Accepted, July 2013 2013

    QR CODE