[1]
|
D. L. Donoho and M. R. Duncan, “Digital Curvelet Transform: Strategy, Implementation and Experiments,” Proceeding of the SPIE on Wavelet Application VII, Orlando, 2000, pp. 12-30.
|
[2]
|
E. J. Candes, L. Demanet and D. L. Donoho, “Fast Discrete Curvelet Transforms [R],” Applied and Computational Mathematics, 2005, pp. 1-43.
|
[3]
|
J. P. Shi and Z. J. Zhai, “Curvelet Transform for Image Authentication,” Rough Set and Knowledge Technology, LNAI 4062, 2006, pp. 659-664.
|
[4]
|
T. D. Hien, I. Kei, H. Harak, et al., “Curvelet-Domain Image Watermarking Based on Edge-Embedding,” Lecture Notes in Computer Science, Vol. 4693, No. 2010, 2007, pp. 311-317.
|
[5]
|
T. D. Hien, K. Miyara, et al., “Curvelet Transform Based Logo Watermarking,” Innovative Algo-Rithms and Techniques in Automation, Industrial Electronics and Telecommunication, 2007, pp. 305-309.
|
[6]
|
H. Y. Leung, L. M. Cheng and L. L. Cheng, “Digital Watermarking Schemes Using Multi-Resolution Curvelet and HVS Model,” Lecture Notes in Computer Science, Vol. 5703, 2009, pp. 4-13.
|
[7]
|
H. Y. Leung, L. M. Cheng and L. L. Cheng. “A Robust Watermarking Scheme Using Selective Curvelet Coefficients,” International Conference on Intelligient Information Hiding and Multimedia Signal Processing, Harbin, August 2008, pp. 465-468.
|
[8]
|
T. D. Hien, K. Miyara, I. Kei and F. F. Ali, “Digital Watermarking Based on Curvelet Transform,” 9th International Symposium on Signal Processing and Its Applications, Sharjah, Feburary 2007, pp. 1-4.
|
[9]
|
J. L. Cheng and T. Shan. “Development and Prospect of Image Multiscale Geometric Analysis,” Acta Electronic Sinica, Vol. 31, No. 12 A, pp. 1975-1981.
|
[10]
|
A. P. Fabien and Petitcolas. “Watermarking Schemes Evaluation,” IEEE. Signal Processing, Vol. 17, No. 5, 2000, pp. 58-64.
|
[11]
|
Stirmark. http://www.petitcolas.net/fabien/watermarking /stirmark/
|