% This file was created with JabRef 2.6.
% Encoding: UTF-8

@ARTICLE{Anderson,
  author = {Anderson, R.},
  title = {Information Hiding},
  journal = {Springer-Verlag},
  year = {1996},
  volume = {1174},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Baxes,
  author = {Baxes., G. A.},
  title = {Digital Image Processing. Principles and Applications.},
  year = {1994},
  pages = {37, 99, 105--106},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Abbas,
  author = {Abbas Cheddad and Joan Condell and Kevin Curran and Paul Mc Kevitt.},
  title = {Digital Image Steganography: Survey and analysis of current methods},
  journal = {Digital image steganography},
  year = {2010},
  pages = {727-752},
  number = {90},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Abbas:PDF},
  owner = {delgado},
  timestamp = {2011.11.11}
}

@ARTICLE{Ching,
  author = {Lin Ching-Yung. and Wu Min. and Bloom, Jeffrey A. and Cox, Ingemar
	J. and Miller, Matt L. and Lui, Yui Man.},
  title = {Rotation, Scale, and Translation Resilient Watermarking for Images},
  year = {2001},
  volume = {10},
  pages = {767--782},
  number = {5},
  date = {may},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Lin.pdf:PDF},
  keywords = {Fourier magnitudes;Fourier transform;JPEG compression;RST distortions;blind
	detection;correlation coefficient;cropping;cyclical shift;detection
	measure;geometric distortions;images;log-polar coordinates;log-radius
	axis;one-dimensional signal;public watermark;resampling;rotation;scale;search;still
	images;translation resilient watermarking;video;Fourier transforms;copy
	protection;data encapsulation;image coding;security of data;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Christopher,
  author = {Christopher, N.Gutierrez and Gautam, Kakani and Ramesh, C. Verma
	and Taehyung (George), Wang,},
  title = {Digital Watermarking of Medical Images for Mobile Devices},
  booktitle = {Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010
	IEEE International Conference on},
  year = {2010},
  pages = {421 -425},
  month = {june},
  doi = {10.1109/SUTC.2010.47},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Christopher.pdf:PDF}
}

@ARTICLE{Coxi,
  author = {Cox, I.J. and Miller, M.L. and McKellips A.L.},
  title = {Watermarking as Communications with side Information},
  year = {1999},
  volume = {87},
  pages = {1127--1141},
  number = {7},
  date = {jul},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/IngemarJ.pdf:PDF},
  keywords = {embedded signaling;side information;spread-spectrum communications;transmitter;watermarking
	detection;watermarking insertion;copy protection;encoding;industrial
	property;signal detection;signal processing;spread spectrum communication;telecommunication
	signalling;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Icox,
  author = {I. J. Cox and Killian, T. Leighton and T. Shamoon.},
  title = {Secure Spread Spectrum Watermarking for Images, Audio and Video.},
  journal = {IEEE},
  year = {1996},
  volume = {16},
  pages = {243--246},
  number = {19},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Icox.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@BOOK{Inge,
  title = {Digital Watermarking and Steganography.},
  year = {2007},
  editor = {Elsevier},
  author = {Ingemar J. Cox and Matthew L. Miller and Jeffrey A. Bloom and Jessica
	Fridrich and Ton. Kalker},
  pages = {624},
  edition = {2},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/TUTOR/libros/Libros WaterMarking/ebooksclub.org__Digital_Watermarking_and_Steganography__2nd_Ed___The_Morgan_Kaufmann_Series_in_Multimedia_Information_and_Systems_.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@TECHREPORT{Cox,
  author = {I. J. Cox. and Killian, T. Leighton and T. Shamoon.},
  title = {Secure Spread Spectrum Communication for Multimedia},
  year = {1995},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Cox.pdf:PDF},
  owner = {delgado},
  publisher = {N.E.C. Research Institute},
  timestamp = {2011.11.10}
}

@ARTICLE{Depovere,
  author = {Geert Depovere and Ton. Kalker and Jaap. Haitsma and Maurice Maes
	and Lieven. de Strycker and Pascale. Termont and Jan. Vandewege and
	Andreas. Langell and Claes Alm and Per Norman and Gerry. O'Reilly
	and Bob Howes and Henk. Vaanholt and Rein. Hintzen and Pat. Donnelly
	and Andy Hudson.},
  title = {The VIVA project: Digital Watermarking for Broadcast Monitoring},
  journal = {Image Processing},
  year = {1999},
  volume = {2},
  pages = {202--205},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Depovere.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Alan,
  author = {E., Bell Alan},
  title = {The Dynamic Digital Disk},
  journal = {Spectrum, IEEE},
  year = {1999},
  volume = {36},
  pages = {28--35},
  number = {10},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Alan.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@MISC{Hartung,
  author = {Frank Hartung, Jonathan K. Su \& Girod., Bernd},
  title = {Spread Spectrum Watermarking: Malicious attacks and counterattacks},
  year = {1999},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Hartung.pdf:PDF},
  owner = {delgado},
  pages = {147--158},
  timestamp = {2011.11.10}
}

@ARTICLE{Frank,
  author = {Frank, Hartung and Martin., Kutter},
  title = {Multimedia Watermarking Techniques},
  year = {1999},
  volume = {87},
  pages = {1079-1107},
  number = {7},
  date = {July},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Frank.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Jiri,
  author = {Fridrich, J. and Goljan, M. and Baldoza, A.C.},
  title = {New Fragile Authentication Watermark for Images},
  year = {2000},
  volume = {1},
  pages = {446-449 vol.1},
  booktitle = {Image Processing, 2000. Proceedings. 2000 International Conference
	on},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Jiri.pdf:PDF},
  keywords = {binary logo;block cipher;collage detection;cryptographic protocol;fragile
	authentication watermark;image authentication;image indices embedding;pixel
	values;security requirements;copy protection;cryptography;image coding;message
	authentication;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@MISC{Denso,
  author = {Incorporated, Denso Wave},
  title = {QR Code.com},
  year = {2011},
  date = {November},
  owner = {delgado},
  timestamp = {2011.11.10},
  url = {http://www.denso-wave.com/qrcode/index-e.html
}
}

@TECHREPORT{SDMI,
  author = {SDMI (Secure Digital Music Initiative)},
  title = {SDMI {P}ortable {D}evice {S}pecification-Part 1},
  year = {1999},
  date = {July},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/SDMI.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Brousil,
  author = {James, K. Brousil and Smith, R. Smith.},
  title = {A Threshold Logic Network for Shape Invariance},
  journal = {Electronic Computers, IEEE Transactions on},
  year = {1967},
  volume = {EC-16},
  pages = {818--828},
  number = {6},
  date = {December},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Brousil.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Juan,
  author = {Juan R., Hern\'andez and Fernando, P\'erez Gonz\'alez and Jos\'e
	Manuel, Rodr\'iguez and Gustavo, Nieto.},
  title = {Performance Analysis of a 2-D-multipulse Amplitude Modulation Scheme
	for Data Hiding and Watermarking of Still Images},
  journal = {Selected Areas in Communications, IEEE Journal on},
  year = {1998},
  volume = {16},
  pages = {510--524},
  number = {4},
  date = {may},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Juan.pdf:PDF},
  keywords = {2D-multipulse amplitude modulation;approximations;bit error rate;bounds;communications
	system;copyright protection;data hiding;detection probability;experimental
	results;false alarm probability;key-dependent 2D multipulse modulation;ownership
	enforcement;ownership verification;performance analysis;performance
	measurements;receiver operating characteristic;still images;threshold;watermark
	detection test;watermarking;amplitude modulation;coding errors;copyright;data
	encapsulation;error statistics;image coding;probability;receivers;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Kang,
  author = {Xiangui Kang and Jiwu Huang and Wenjun Zeng},
  title = {Efficient General Print-Scanning Resilient Data Hiding Based on Uniform
	Log-Polar Mapping},
  journal = {Information Forensics and Security, IEEE Transactions on},
  year = {2010},
  volume = {5},
  pages = {1 -12},
  number = {1},
  month = {march },
  abstract = {Este esquema adem\'as de garantizar la robustez en contra de los ataques
	geom\'etricos tambi\'en garantiza la robustez en el proceso general
	de impresi\'on y escaneado de la imagen marcada, este enfoque se
	basa en un mapeo uniforme log-polar (ULPM), utiliza un indice de
	frecuencias (u,v) en el sistema cartesiano para obtener las coordenadas
	discretas log-polar (l1,l2), el esquema propuesto remueve las distorisiones
	ocasionadas por la interpolaci\'on, pero tambien expande en gran
	parte la cardinalidad de la marca de agua en el dominio del mapeo
	log-polar. Las pruebas se realizaron con un conjunto diferente de
	im\'agenes y estas fueron sometidas a una gran variedad de distorciones
	geom\'etricas, los resultados obtenidos de las pruebas realizadas
	muestran una exelente robustez despu\'es de que las imagenes fueron
	marcadas y sometidas a diferentes distorisiones y/o ataques geom\'etricos,
	entre ellas la impresi\'on y escaneado, el PSNR obtenido est\'a en
	el rango de 38.0 y 43.7 dB (decibeles).},
  doi = {10.1109/TIFS.2009.2039604},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Xiangui.pdf:PDF},
  issn = {1556-6013},
  keywords = {Cartesian system;blind resynchronization;discrete Fourier transform
	coefficient;discrete log-polar coordinate;frequency index;geometric
	distortion;interference distortion;interpolation distortion;inverse
	log-polar mapping;near uniform log-polar mapping;print-scanning resilient
	robust data hiding;receiver operating characteristic performance;signal
	processing;watermark signal;data encapsulation;discrete Fourier transforms;distortion;image
	scanners;inverse problems;watermarking;}
}

@TECHREPORT{Komatsu,
  author = {Komatsu, N. and Tominaga., H.},
  title = {Authentication System Using Concealed Image in Telematics.},
  year = {1988},
  owner = {delgado},
  publisher = {Waseda University},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Lee,
  author = {Lee, Min-Jeong and Kim, Kyung-Su and Lee Hae-Yeoun and Oh Tae-Woo
	and Suh Young-Ho and Lee Heung-Kyu},
  title = {Robust Watermark Detection Against D-A/A-D Conversion for Digital
	Cinema using Local Auto-correlation Function},
  booktitle = {Image Processing, 2008. ICIP 2008. 15th IEEE International Conference
	on},
  year = {2008},
  pages = {425--428},
  date = {oct.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Lee.pdf:PDF},
  keywords = {D-A/A-D conversion attack;affine transform;blind robust watermark
	detection;digital cinema;geometrical distortion;local auto-correlation
	function;mathematical model;signal processing distortion;video processing
	attack;affine transforms;analogue-digital conversion;cinematography;digital-analogue
	conversion;object detection;video coding;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Lubin,
  author = {Jeffrey Lubin and Jeffrey A. Bloom and Cheng., Hui},
  title = {Robust, Content-Dependent, High-Fidelity Watermark for Tracking in
	Digital Cinema},
  year = {2003},
  volume = {5020},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Jeffrey.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Marco,
  author = {Marco A. Acevedo M and José Luis López Bonilla and Roberto Linares
	y Miranda},
  title = {Método Robusto de Marca de Agua para Audio con Transformada Haar},
  year = {2005},
  volume = {8},
  pages = {218-230},
  number = {3},
  month = {Enero},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Marco.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.17}
}

@ARTICLE{Dan,
  author = {Ma., Dan Yu and Farook Sattar and Kai-Kuang},
  title = {Watermark Detection and Extraction Using Independent Component Analysis
	Method},
  year = {2002},
  volume = {1},
  pages = {92--104},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Dan.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@BOOK{Mauro,
  title = {Watermarking Systems Engineering. Signal Processing and Communications.},
  publisher = {CRC Press},
  year = {2004},
  author = {Barni Mauro and Bartolini Franco},
  edition = {Rev.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Mauro.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Memon,
  author = {Nasir Memon and Ping Wah Wong.},
  title = {Protecting Digital Media Content.},
  journal = {Comunications.},
  year = {1998},
  volume = {41},
  pages = {35--43},
  number = {7},
  date = {July.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Memon.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Minerva,
  author = {Minerva., M. Yeung},
  title = {Digital Watermarking},
  journal = {ACM},
  year = {1998},
  volume = {41},
  pages = {31--33},
  number = {7},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Moulin,
  author = {Moulin, Pierre. and Ivanovic, Aleksandar.},
  title = {The Zero-rate Spread-spectrum Watermarking Game},
  journal = {Signal Processing, IEEE Transactions on},
  year = {2003},
  volume = {51},
  pages = { 1098--1117},
  number = {4},
  date = {apr},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Pierre.pdf:PDF},
  keywords = { AR processes; Gaussian host vectors; Gaussian test channels; KLT
	coefficients; Karhunen-Loeve transform; additive watermarks; adversary;
	autoregressive processes; correlation detectors; detection performance;
	efficient signal components; error probability; heuristic power allocation;
	maxmin power-allocation problem; message embedding; optimal distributions;
	optimal watermark design; probability distributions; signal sample
	size; small-distortion; spread-spectrum watermarking; squared-error
	distortion constraints; statistical hypothesis testing; wavelet-based
	image watermarking; worst-case attack; zero-rate spread-spectrum
	watermarking game; zero-rate transmission; Karhunen-Loeve transforms;
	autoregressive processes; correlation methods; data compression;
	error statistics; image coding; image sampling; security of data;
	signal detection; spread spectrum communication; transform coding;
	watermarking; wavelet transforms;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Fernando,
  author = {Perez-Gonzalez, F. and Balado, F\'elix. and Martin Juan, R. Hern\'andez.},
  title = {Performance Analysis of Existing and new Methods for Data Hiding
	with Known-host Information in Additive Channels},
  journal = {Signal Processing, IEEE Transactions on},
  year = {2003},
  volume = {51},
  pages = { 960--980},
  number = {4},
  date = {apr},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Fernando.pdf:PDF},
  keywords = { Monte Carlo simulations; QP; additive channels; channel distortions;
	data hiding; decoding error; dithered modulation; known-host information;
	near-optimal ML decoding; performance analysis; probability of error;
	quantization; quantized projection; spread-spectrum approaches; Monte
	Carlo methods; data encapsulation; error statistics; image coding;
	maximum likelihood decoding; modulation; spread spectrum communication;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Stefan,
  author = {Petitolas., Stephan Katzenbeisser and .Fabien},
  title = {Information Hiding Techniques for Steganography and Digital Watermaking},
  year = {2000},
  volume = {28},
  pages = {1--2},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Pitas,
  author = {Pitas, Ioannis},
  title = {A Method for Watermark casting on Digital Image},
  journal = {Circuits and Systems for Video Technology, IEEE Transactions on},
  year = {1998},
  volume = {8},
  pages = {775--780},
  number = {6},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ioannis.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Poljicak,
  author = {Ante Poljicak and Lidija Mandic and Darko Agic},
  title = {Robustness of A {DFT} Based Image Watermarking Method Against Am
	Halftoning},
  year = {2011},
  volume = {18},
  pages = {161-166},
  number = {2},
  month = {Jun},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ante.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.11}
}

@ARTICLE{Xiaojun,
  author = {Qi, Xiaojun and Qi., Ji},
  title = {Image Content-Based Geometric Transformation Resistant Watermarking
	Aproach},
  year = {2005},
  volume = {2},
  pages = {829--832},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Xiaojun.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Raman,
  author = {S.P. Raman and U.B. Desai.},
  title = {2-D object Recognition using {F}ourier {M}ellin {T}ransform and a
	MLP Network},
  journal = {Neural Networks, 1995. Proceedings., IEEE International Conference
	on.},
  year = {1995},
  volume = {4},
  pages = {2154--2156},
  date = {December},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Raman.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Ridzon,
  author = {Ridzon, R. and Levicky, D.},
  title = {Robust Image Watermarking Based on the Synchronization Template},
  booktitle = {Radioelektronika, 2008 18th International Conference},
  year = {2008},
  pages = {1--4},
  date = {april},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Radovan1.pdf:PDF},
  keywords = {authentication method;data hiding;digital image watermarking;ownership
	rights protection;synchronization template;copyright;data encapsulation;image
	coding;message authentication;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Radovan,
  author = {Ridzon, R. and Levicky, D.},
  title = {Log-polar Mapping in Robust Digital Image Watermarking},
  booktitle = {Radioelektronika, 2007. 17th International Conference},
  year = {2007},
  pages = {1--4},
  date = {april},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Radovan.pdf:PDF},
  keywords = {affine transformations;discrete Fourier transform;geometrical attacks;log-polar
	mapping;robust digital image watermarking;watermark detection;watermark
	embedding;affine transforms;discrete Fourier transforms;transform
	coding;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@MISC{MD5,
  author = {Rivest, R. L.},
  title = {The {MD5} Message Digest Algorithm},
  year = {1992},
  date = {Abril},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{RSA,
  author = {R. L. Rivest and A. Shamir \& Adleman, L.},
  title = {A method for obtaining digital signatures and public-key cryptosystems},
  journal = {Communications of the ACM.},
  year = {1978},
  volume = {21},
  pages = {120--126},
  date = {February},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Robbins,
  author = {Gregory M. Robbins and Thomas S. Huang.},
  title = {Inverse Filtering for Linear Shift-Variant Imaging Systems},
  year = {1972},
  volume = {60},
  pages = {862--872},
  number = {7},
  date = {July},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Robbins.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{JJK,
  author = {Ruanaidh, J.J.K.O. and Dowling, W.J. and Boland F.M.},
  title = {Phase Watermarking of Digital Images},
  year = {1996},
  volume = {3},
  pages = {239--242 vol.3},
  booktitle = {Image Processing, 1996. Proceedings., International Conference on},
  date = {sep},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/JJK.pdf:PDF},
  keywords = {DFT;additive Gaussian noise;cropping;grey scale digital images;image
	processing;image recipient;image source;lossy image compression;low
	pass filtering;matrix transformations;optimal detectors;phase based
	method;phase watermarking;rescaling;spread spectrum communication
	techniques;transform coding;translation;vector quantization;watermark
	design;watermark identification;watermark information;data compression;discrete
	Fourier transforms;image coding;security of data;signal detection;spread
	spectrum communication;transform coding;vector quantisation;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ruanaidh,
  author = {J.K. Joseph O Ruanaidh and Thierry Pun.},
  title = {Rotation, Scale and Translation Invariant Digital Image Watermarking},
  journal = {Image Processing},
  year = {1997},
  volume = {1},
  pages = {536--539},
  date = {October},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ruanaidh.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@TECHREPORT{Craver,
  author = {Scott, Craver and Nasir, Memon and Boon-Lock, Yeo and Minerva, Yeung
	M.},
  title = {Can Invisible Watermarks Solve Rightful Ownerships?},
  year = {1996},
  date = {July.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Craver.ps.gz:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Mohammad,
  author = {Soheili, Mohammad Reza},
  title = {A Robust Digital Image Watermarking Scheme Based on {DWT}},
  year = {2010},
  volume = {2},
  pages = {75--82},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Mohammad.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Key,
  author = {Van Schyndel, R.G. and Tirkel, A.Z. and Svalbe I.D.},
  title = {Key Independent Watermark Detection},
  booktitle = {Multimedia Computing and Systems, 1999. IEEE International Conference
	on},
  year = {1999},
  volume = {1},
  pages = {580--585 vol.1},
  month = {Jun},
  date = {jul},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Key.pdf:PDF},
  keywords = {Fourier transform;Legendre sequences;Legendre-based watermark;encrypted
	data;frequency representation;key independent watermark detection;multimedia;pixel;pseudo-random
	signals;sequence-encrypted image;signature encryption;spatial representation;spread
	spectrum signal techniques;two level auto-correlation;Fourier transforms;copyright;cryptography;image
	coding;multimedia systems;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Xiangyang,
  author = {Wang, Xiangyang and Wu, Jun and Niu Panpan},
  title = {A New Digital Image Watermarking Algorithm Resilient to Desynchronization
	Attacks},
  year = {2007},
  volume = {2},
  pages = {655--663},
  number = {4},
  date = {dec.},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Xiangyang.pdf:PDF},
  keywords = {Harris-Laplace detector;affine transformation;desynchronization attack;digital
	image watermarking;discrete Fourier transform;feature extraction;image
	representation;local characteristic region;affine transforms;discrete
	Fourier transforms;feature extraction;image coding;image representation;watermarking;},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Wong,
  author = {Wong, Ping Wah},
  title = {A Public Key Watermark for Image Verification and Authentication},
  year = {1998},
  volume = {1},
  pages = {455--459},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Ping3.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ping2,
  author = {Wong, Ping Wah and Edward J. Delp},
  title = {Security and {W}atermarking of {M}ultimedia {C}ontents {II}},
  journal = {Society of Photo-optical Instrumentation Engineers},
  year = {2000},
  volume = {3971},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@ARTICLE{Ping1,
  author = {Wong, Ping Wah and Edward, J. Delp},
  title = {Security and {W}atermarking of {M}ultimedia {C}ontents},
  journal = {Society of Photo-optical Instrumentation Engineers},
  year = {1999},
  volume = {3657},
  owner = {delgado},
  timestamp = {2011.11.10}
}

@INPROCEEDINGS{Zheng,
  author = {Dong Zheng and Yan Liu and Jiying Zhao},
  title = {A Survey of RST Invariant Image Watermarking Algorithms},
  booktitle = {Proc. Canadian Conf. Electrical and Computer Engineering CCECE '06},
  year = {2006},
  pages = {2086--2089},
  doi = {10.1109/CCECE.2006.277712},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Survey.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.14}
}

@ARTICLE{Zheng2003,
  author = {Zheng, D. and Zhao, J. and El Saddik, A.},
  title = {RST-invariant Digital Image Watermarking based on Log-polar Mapping
	and Phase Correlation},
  journal = IEEE_J_CASVT,
  year = {2003},
  volume = {13},
  pages = {753--765},
  number = {8},
  doi = {10.1109/TCSVT.2003.815959},
  file = {:/home/delgado/CINVESTAV/CUATRIMESTRE IV/SEMINARIO DE TESIS I/ARTICULOS/Zheng2003.pdf:PDF},
  owner = {delgado},
  timestamp = {2011.11.14}
}

