% This file was created with JabRef 2.6.
% Encoding: UTF-8

@ARTICLE{Abbas,
  author = {Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt.},
  title = {Digital image steganography: Survey and analysis of current methods},
  journal = {Digital image steganography},
  year = {2010},
  pages = {727-752},
  number = {90},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Abbas:PDF},
  owner = {delgado},
  timestamp = {2011.11.11}
}

@ARTICLE{Anderson,
  author = {Anderson, R.},
  title = {Information Hiding},
  journal = {Springer-Verlag},
  year = {1996},
  volume = {1174},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ante,
  author = {Ante Poljicak, Lidija Mandic, Darko Agic},
  title = {Robustness Of A Dft Based Image Watermarking Method Against Am Halftoning},
  year = {2011},
  volume = {18},
  pages = {161-166},
  number = {2},
  month = {Jun},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ante.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.11}
}

@ARTICLE{Baxes,
  author = {Baxes., G. A.},
  title = {Digital Image Processing. Principles and Applications.},
  year = {1994},
  pages = {37, 99, 105--106},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{IngemarJ,
  author = {Cox, I.J.; Miller, M.L. \& McKellips A.L.},
  title = {Watermarking as communications with side information},
  journal = {Proceedings of the IEEE},
  year = {1999},
  volume = {87},
  pages = {1127--1141},
  number = {7},
  date = {jul},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/IngemarJ.pdf:PDF},
  keywords = {embedded signaling;side information;spread-spectrum communications;transmitter;watermarking
	detection;watermarking insertion;copy protection;encoding;industrial
	property;signal detection;signal processing;spread spectrum communication;telecommunication
	signalling;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Alan,
  author = {E., Bell Alan},
  title = {The dynamic digital disk},
  journal = {Spectrum, IEEE},
  year = {1999},
  volume = {36},
  pages = {28--35},
  number = {10},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Alan.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@MISC{Hartung,
  author = {Frank Hartung, Jonathan K. Su \& Girod., Bernd},
  title = {Spread Spectrum Watermarking: Malicious attacks and counterattacks},
  year = {1999},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Hartung.pdf:PDF},
  owner = {delgado},
  pages = {147--158},
  timestamp = {2011.11.10}
}

@ARTICLE{Frank,
  author = {Frank, Hartung \& Martin., Kutter},
  title = {Multimedia Watermarking Techniques},
  year = {1999},
  volume = {87},
  pages = {1079--1107},
  number = {7},
  date = {July},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Frank.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Jiri,
  author = {Fridrich, J.; Goljan, M. \& Baldoza A.C.},
  title = {New fragile authentication watermark for images},
  booktitle = {Image Processing, 2000. Proceedings. 2000 International Conference
	on},
  year = {2000},
  volume = {1},
  pages = {446--449 vol.1},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Jiri.pdf:PDF},
  keywords = {binary logo;block cipher;collage detection;cryptographic protocol;fragile
	authentication watermark;image authentication;image indices embedding;pixel
	values;security requirements;copy protection;cryptography;image coding;message
	authentication;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Depovere,
  author = {G. Depovere, T. Kalker, J. Haitsma M. Maes L. de Strycker P. Termont
	J. Vandewege A. Langell C. Alm P. Norman B. O'Reilly G. Howes H.
	Vaanholt R. Hintzen P. Donnelly \& Hudson. A.},
  title = {The VIVA project: Digital Watermarking for Broadcast Monitoring},
  journal = {Image Processing},
  year = {1999},
  volume = {2},
  pages = {202--205},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Depovere.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Robbins,
  author = {Gregory M. Robbins, Thomas S. Huang.},
  title = {Inverse Filtering for Linear Shift-Variant Imaging Systems},
  journal = {Proceedings of the IEEE},
  year = {1972},
  volume = {60},
  pages = {862--872},
  number = {7},
  date = {July},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Robbins.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Christopher,
  author = {Gutierrez, Christopher N. and Kakani, Gautam and Verma, Ramesh C.
	and Wang, Taehyung (George)},
  title = {Digital Watermarking of Medical Images for Mobile Devices},
  booktitle = {Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010
	IEEE International Conference on},
  year = {2010},
  pages = {421 -425},
  month = {june},
  doi = {10.1109/SUTC.2010.47},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Christopher.pdf:PDF}
}

@ARTICLE{Juan,
  author = {Hernandez, J.R.; Perez-Gonzalez, F.; Rodriguez J.M. \& Nieto G.},
  title = {Performance analysis of a 2-D-multipulse amplitude modulation scheme
	for data hiding and watermarking of still images},
  journal = {Selected Areas in Communications, IEEE Journal on},
  year = {1998},
  volume = {16},
  pages = {510--524},
  number = {4},
  date = {may},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Juan.pdf:PDF},
  keywords = {2D-multipulse amplitude modulation;approximations;bit error rate;bounds;communications
	system;copyright protection;data hiding;detection probability;experimental
	results;false alarm probability;key-dependent 2D multipulse modulation;ownership
	enforcement;ownership verification;performance analysis;performance
	measurements;receiver operating characteristic;still images;threshold;watermark
	detection test;watermarking;amplitude modulation;coding errors;copyright;data
	encapsulation;error statistics;image coding;probability;receivers;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Icox,
  author = {I. J. Cox. Killian, T. Leighton, T. Shamoon.},
  title = {Secure Spread Spectrum Watermarking for Images, Audio and Video.},
  journal = {IEEE},
  year = {1996},
  volume = {16},
  pages = {243--246},
  number = {19},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Icox.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@TECHREPORT{Cox,
  author = {I. J. Cox., Killian, T. Leighton T. Shamoon.},
  title = {Secure Spread Spectrum Communication for Multimedia},
  year = {1995},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Cox.pdf:PDF},
  owner = {delgado},
  publisher = {N.E.C. Research Institute},
  timestamp = {2011.11.10}
}

@MISC{Denso,
  author = {Incorporated, Denso Wave},
  title = {QR Code.com},
  year = {2011},
  date = {November},
  owner = {delgado},
  timestamp = {2011.11.10},
  url = {http://www.denso-wave.com/qrcode/index-e.html
}
}

@TECHREPORT{SDMI,
  author = {Initiative), SDMI (Secure Digital Music},
  title = {SDMI Portable Device Specification-Part 1},
  year = {1999},
  date = {July},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/SDMI.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@BOOK{Inge,
  title = {Digital Watermarking and Steganography.},
  year = {2007},
  editor = {Elsevier},
  author = {J. Cox Ingemar, L. Miller Matthew, A. Bloom Jeffrey Fridrich Jessica
	\& Ton. Kalker},
  pages = {624},
  edition = {2},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/TUTOR/libros/Libros WaterMarking/ebooksclub.org__Digital_Watermarking_and_Steganography__2nd_Ed___The_Morgan_Kaufmann_Series_in_Multimedia_Information_and_Systems_.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Brousil,
  author = {James K. Brousil. Smith, R. Smith.},
  title = {A Threshold Logic Network for Shape Invariance},
  journal = {Electronic Computers, IEEE Transactions on},
  year = {1967},
  volume = {EC-16},
  pages = {818--828},
  number = {6},
  date = {December},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Brousil.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Jeffrey,
  author = {Jeffrey Lubin, Jeffrey A. Bloom \& Cheng., Hui},
  title = {Robust, Content-Dependent, High-Fidelity Watermark for Tracking in
	Digital Cinema},
  year = {2003},
  volume = {5020},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Jeffrey.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ruanaidh,
  author = {Joseph J.K. 0 Ruanaidh, Thierry Pun.},
  title = {Rotation, Scale and Translation Invariant Digital Image Watermarking},
  journal = {Image Processing, 1997. Proceedings., International Conference on},
  year = {1997},
  volume = {1},
  pages = {536--539},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ruanaidh.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Xiangui,
  author = {Xiangui Kang and Jiwu Huang and Wenjun Zeng},
  title = {Efficient General Print-Scanning Resilient Data Hiding Based on Uniform
	Log-Polar Mapping},
  journal = {Information Forensics and Security, IEEE Transactions on},
  year = {2010},
  volume = {5},
  pages = {1 -12},
  number = {1},
  month = {march },
  __markedentry = {[delgado]},
  abstract = {Este esquema adem\'as de garantizar la robustez en contra de los ataques
	geom\'etricos tambi\'en garantiza la robustez en el proceso general
	de impresi\'on y escaneado de la imagen marcada, este enfoque se
	basa en un mapeo uniforme log-polar (ULPM), utiliza un indice de
	frecuencias (u,v) en el sistema cartesiano para obtener las coordenadas
	discretas log-polar (l1,l2), el esquema propuesto remueve las distorisiones
	ocasionadas por la interpolaci\'on, pero tambien expande en gran
	parte la cardinalidad de la marca de agua en el dominio del mapeo
	log-polar. Las pruebas se realizaron con un conjunto diferente de
	im\'agenes y estas fueron sometidas a una gran variedad de distorciones
	geom\'etricas, los resultados obtenidos de las pruebas realizadas
	muestran una exelente robustez despu\'es de que las imagenes fueron
	marcadas y sometidas a diferentes distorisiones y/o ataques geom\'etricos,
	entre ellas la impresi\'on y escaneado, el PSNR obtenido est\'a en
	el rango de 38.0 y 43.7 dB (decibeles).},
  doi = {10.1109/TIFS.2009.2039604},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Xiangui.pdf:PDF},
  issn = {1556-6013},
  keywords = {Cartesian system;blind resynchronization;discrete Fourier transform
	coefficient;discrete log-polar coordinate;frequency index;geometric
	distortion;interference distortion;interpolation distortion;inverse
	log-polar mapping;near uniform log-polar mapping;print-scanning resilient
	robust data hiding;receiver operating characteristic performance;signal
	processing;watermark signal;data encapsulation;discrete Fourier transforms;distortion;image
	scanners;inverse problems;watermarking;}
}

@TECHREPORT{Komatsu,
  author = {Komatsu, N. \& Tominaga., H.},
  title = {Authentication System Using Concealed Image in Telematics.},
  year = {1988},
  owner = {delgado},
  publisher = {Waseda University},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Lee,
  author = {Lee, Min-Jeong; Kim, Kyung-Su; Lee Hae-Yeoun; Oh Tae-Woo; Suh Young-Ho
	\& Lee Heung-Kyu},
  title = {Robust watermark detection against D-A/A-D conversion for digital
	cinema using local auto-correlation function},
  booktitle = {Image Processing, 2008. ICIP 2008. 15th IEEE International Conference
	on},
  year = {2008},
  pages = {425--428},
  date = {oct.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Lee.pdf:PDF},
  keywords = {D-A/A-D conversion attack;affine transform;blind robust watermark
	detection;digital cinema;geometrical distortion;local auto-correlation
	function;mathematical model;signal processing distortion;video processing
	attack;affine transforms;analogue-digital conversion;cinematography;digital-analogue
	conversion;object detection;video coding;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Lin,
  author = {Lin, C.-Y. and Wu, M. and Bloom J.A. and Cox I.J. and Miller M.L.
	and Lui Y.M.},
  title = {Rotation, scale, and translation resilient watermarking for images},
  journal = {Image Processing, IEEE Transactions on},
  year = {2001},
  volume = {10},
  pages = {767--782},
  number = {5},
  date = {may},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Lin.pdf:PDF},
  keywords = {Fourier magnitudes;Fourier transform;JPEG compression;RST distortions;blind
	detection;correlation coefficient;cropping;cyclical shift;detection
	measure;geometric distortions;images;log-polar coordinates;log-radius
	axis;one-dimensional signal;public watermark;resampling;rotation;scale;search;still
	images;translation resilient watermarking;video;Fourier transforms;copy
	protection;data encapsulation;image coding;security of data;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Dan,
  author = {Ma., Dan Yu. Farook Sattar. Kai-Kuang},
  title = {Watermark Detection and Extraction Using Independent Component Analysis
	Method},
  year = {2002},
  volume = {1},
  pages = {92--104},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Dan.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Marco,
  author = {Marco A. Acevedo M, José Luis López Bonilla y Roberto Linares y Miranda},
  title = {Método Robusto de Marca de Agua para Audio con Transformada Haar},
  year = {2005},
  volume = {8},
  pages = {218-230},
  number = {3},
  month = {Enero},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Marco.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.17}
}

@BOOK{Mauro,
  title = {Watermarking Systems Engineering. Signal Processing and Communications.},
  publisher = {CRC Press},
  year = {2004},
  author = {Barni Mauro and Bartolini Franco},
  edition = {Rev.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Mauro.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Minerva,
  author = {Minerva., M. Yeung},
  title = {Digital Watermarking},
  journal = {ACM},
  year = {1998},
  volume = {41},
  pages = {31--33},
  number = {7},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Pierre,
  author = {Moulin, Pierre. \& Ivanovic, Aleksandar.},
  title = {The zero-rate spread-spectrum watermarking game},
  journal = {Signal Processing, IEEE Transactions on},
  year = {2003},
  volume = {51},
  pages = { 1098--1117},
  number = {4},
  date = {apr},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Pierre.pdf:PDF},
  keywords = { AR processes; Gaussian host vectors; Gaussian test channels; KLT
	coefficients; Karhunen-Loeve transform; additive watermarks; adversary;
	autoregressive processes; correlation detectors; detection performance;
	efficient signal components; error probability; heuristic power allocation;
	maxmin power-allocation problem; message embedding; optimal distributions;
	optimal watermark design; probability distributions; signal sample
	size; small-distortion; spread-spectrum watermarking; squared-error
	distortion constraints; statistical hypothesis testing; wavelet-based
	image watermarking; worst-case attack; zero-rate spread-spectrum
	watermarking game; zero-rate transmission; Karhunen-Loeve transforms;
	autoregressive processes; correlation methods; data compression;
	error statistics; image coding; image sampling; security of data;
	signal detection; spread spectrum communication; transform coding;
	watermarking; wavelet transforms;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Memon,
  author = {Nasir Memon, Ping Wah Wong.},
  title = {Protecting Digital Media Content.},
  journal = {Comunications.},
  year = {1998},
  volume = {41},
  pages = {35--43},
  number = {7},
  date = {July.},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Fernando,
  author = {Perez-Gonzalez, F.; Balado, F. \& Martin J.R.H.},
  title = {Performance analysis of existing and new methods for data hiding
	with known-host information in additive channels},
  journal = {Signal Processing, IEEE Transactions on},
  year = {2003},
  volume = {51},
  pages = { 960--980},
  number = {4},
  date = {apr},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Fernando.pdf:PDF},
  keywords = { Monte Carlo simulations; QP; additive channels; channel distortions;
	data hiding; decoding error; dithered modulation; known-host information;
	near-optimal ML decoding; performance analysis; probability of error;
	quantization; quantized projection; spread-spectrum approaches; Monte
	Carlo methods; data encapsulation; error statistics; image coding;
	maximum likelihood decoding; modulation; spread spectrum communication;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Stefan,
  author = {Petitolas., Stephan Katzenbeisser \&.Fabien},
  title = {Information Hiding Techniques for Steganography and Digital Watermaking},
  year = {2000},
  volume = {28},
  pages = {1--2},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ioannis,
  author = {Pitas, Ioannis},
  title = {A Method for Watermark casting on Digital Image},
  journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
  year = {1998},
  volume = {8},
  pages = {775--780},
  number = {6},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ioannis.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Xiaojun,
  author = {Qi, Xiaojun \& Qi., Ji},
  title = {Image Content-Based Geometric Transformation Resistant Watermarking
	Aproach},
  year = {2005},
  volume = {2},
  pages = {829--832},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Xiaojun.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{RSA,
  author = {R. L. Rivest, A. Shamir \& Adleman, L.},
  title = {A method for obtaining digital signatures and public-key cryptosystems},
  journal = {Communications of the ACM.},
  year = {1978},
  volume = {21},
  pages = {120--126},
  date = {February},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Raman,
  author = {Raman S.P., Desai U.B.},
  title = {2-D object Recognition using Fourier Mellin Transform and a MLP Network},
  journal = {Neural Networks, 1995. Proceedings., IEEE International Conference
	on.},
  year = {1995},
  volume = {4},
  pages = {2154--2156},
  date = {December},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Raman.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Radovan1,
  author = {Ridzon, R. \& Levicky, D.},
  title = {Robust image watermarking based on the synchronization template},
  booktitle = {Radioelektronika, 2008 18th International Conference},
  year = {2008},
  pages = {1--4},
  date = {april},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Radovan1.pdf:PDF},
  keywords = {authentication method;data hiding;digital image watermarking;ownership
	rights protection;synchronization template;copyright;data encapsulation;image
	coding;message authentication;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Radovan,
  author = {Ridzon, R. \& Levicky, D.},
  title = {Log-polar Mapping in Robust Digital Image Watermarking},
  booktitle = {Radioelektronika, 2007. 17th International Conference},
  year = {2007},
  pages = {1--4},
  date = {april},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Radovan.pdf:PDF},
  keywords = {affine transformations;discrete Fourier transform;geometrical attacks;log-polar
	mapping;robust digital image watermarking;watermark detection;watermark
	embedding;affine transforms;discrete Fourier transforms;transform
	coding;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@MISC{MD5,
  author = {Rivest, R. L.},
  title = {The MD5 message digest algorithm},
  year = {1992},
  date = {Abril},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{JJK,
  author = {Ruanaidh, J.J.K.O.; Dowling, W.J. \& Boland F.M.},
  title = {Phase watermarking of digital images},
  booktitle = {Image Processing, 1996. Proceedings., International Conference on},
  year = {1996},
  volume = {3},
  pages = {239--242 vol.3},
  date = {sep},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/JJK.pdf:PDF},
  keywords = {DFT;additive Gaussian noise;cropping;grey scale digital images;image
	processing;image recipient;image source;lossy image compression;low
	pass filtering;matrix transformations;optimal detectors;phase based
	method;phase watermarking;rescaling;spread spectrum communication
	techniques;transform coding;translation;vector quantization;watermark
	design;watermark identification;watermark information;data compression;discrete
	Fourier transforms;image coding;security of data;signal detection;spread
	spectrum communication;transform coding;vector quantisation;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@TECHREPORT{Craver,
  author = {S. Craver, N. Memon, B.-L. Yeo \& Yeung M.M.},
  title = {Can invisible watermarks solve rightful ownerships?},
  year = {1996},
  date = {July.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Craver.ps.gz:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Mohammad,
  author = {Soheili, Mohammad Reza},
  title = {A Robust Digital Image Watermarking Scheme Based on DWT},
  year = {2010},
  volume = {2},
  pages = {75--82},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Mohammad.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Key,
  author = {Van Schyndel, R.G.; Tirkel, A.Z. \& Svalbe I.D.},
  title = {Key independent watermark detection},
  booktitle = {Multimedia Computing and Systems, 1999. IEEE International Conference
	on},
  year = {1999},
  volume = {1},
  pages = {580--585 vol.1},
  month = {Jun},
  date = {jul},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Key.pdf:PDF},
  keywords = {Fourier transform;Legendre sequences;Legendre-based watermark;encrypted
	data;frequency representation;key independent watermark detection;multimedia;pixel;pseudo-random
	signals;sequence-encrypted image;signature encryption;spatial representation;spread
	spectrum signal techniques;two level auto-correlation;Fourier transforms;copyright;cryptography;image
	coding;multimedia systems;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Xiangyang,
  author = {Wang, Xiangyang; Wu, Jun \& Niu Panpan},
  title = {A New Digital Image Watermarking Algorithm Resilient to Desynchronization
	Attacks},
  journal = {Information Forensics and Security, IEEE Transactions on},
  year = {2007},
  volume = {2},
  pages = {655--663},
  number = {4},
  date = {dec.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Xiangyang.pdf:PDF},
  keywords = {Harris-Laplace detector;affine transformation;desynchronization attack;digital
	image watermarking;discrete Fourier transform;feature extraction;image
	representation;local characteristic region;affine transforms;discrete
	Fourier transforms;feature extraction;image coding;image representation;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ping3,
  author = {Wong, Ping Wah},
  title = {A Public Key Watermark for Image Verification and Authentication},
  year = {1998},
  volume = {1},
  pages = {455--459},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ping3.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ping2,
  author = {Wong, Ping Wah \& Edward, J. Delp},
  title = {Security and Watermarking of Multimedia Contents II},
  journal = {Society of Photo-optical Instrumentation Engineers},
  year = {2000},
  volume = {3971},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ping1,
  author = {Wong, Ping Wah \& Edward., J. Delp},
  title = {Security and Watermarking of Multimedia Contents},
  journal = {Society of Photo-optical Instrumentation Engineers},
  year = {1999},
  volume = {3657},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Zheng2006,
  author = {Dong Zheng and Yan Liu and Jiying Zhao},
  title = {A Survey of RST Invariant Image Watermarking Algorithms},
  booktitle = {Proc. Canadian Conf. Electrical and Computer Engineering CCECE '06},
  year = {2006},
  pages = {2086--2089},
  doi = {10.1109/CCECE.2006.277712},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Survey.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.14}
}

@ARTICLE{Zheng2003,
  author = {Zheng, D. and Zhao, J. and El Saddik, A.},
  title = {RST-invariant digital image watermarking based on log-polar mapping
	and phase correlation},
  journal = IEEE_J_CASVT,
  year = {2003},
  volume = {13},
  pages = {753--765},
  number = {8},
  doi = {10.1109/TCSVT.2003.815959},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Zheng2003.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.14}
}

