References
- H. Berghel, "Protection Owner Ship Rights through Digital Watermarking," IEEE Computer Magazine, pp. 101-103, July 1996.
- S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Stegannograpphy and Digital Watermarking, Artech House, 2000.
- I. Cox, M. Miller and J. Bloom, Digital Watermarking, Academic Press, 2002.
- N. Johnson, Z. Duric and S. Jajodia, Information Hiding: Steganography and Watermarking Attacks and Countermeasures, Kluwer Academic Publishers, 2001.
- X. Xiao; X. Sun and M. Chen, "Second-LSB-Dependent Robust Watermarking for Relational Database," IEEE Third International Symposium on Information Assurance and Security 2007, pp. 292-300, August 2007.
- N. Agarwal and A. Goyal, "Robust Watermarking in Transform Domain using Edge Detection Technique," IEEE International Conference on Computational Intelligence and Multimedia Applications 2007, pp. 59-63, December 2007.
- E. First and X. Qi, "A Composite Approach for Blind Grayscale Logo Watermarking," IEEE 2007 ICIP, Vol. 3, pp. 265-268, September 2007.
- A. Venkataramana and P. Raj, "Image Watermarking Using Krawtchouk Moments," IEEE ICCTA'07, pp. 676-680, March 2007.
- Y. Lin, H. Huang, and W. Hsu, "An Embedded Watermark Technique in Video for Copyright Protection," IEEE ICPR'06, Vol. 4, pp. 795-798, 2006.
- J. Ohnishi and K. Matsui" Embedding a Seal into a Picture under Orthogonal Wavelet Transform," Proceedings of the Third IEEE International Conference on Multimedia Computing and System 1996, pp. 514-521, 1996.
- C. Hus and J. Wu, "Multiresolution Watermarks for Digital Images," IEEE Trans. Circuits Syst. II, Vol. 8, No. 8, pp.1097-1101, Aug. 1998.
- A. Said and W. Pearlman, "A New Fast and Efficient Image Codec Based on Set Partitioning in Hierarchical Trees", IEEE Trans. on Circuits and Systems for Video Technology, Vol. 6, June 1995.
- R. Dugad, K. Ratakonda and N. Ahuja, "A New Wavelet-based Scheme for Watermarking Images," Proc. of IEEE ICIP '98, Chicago, IL, USA. October 1998.
- H. Wang, P. Su and C. Kuo, "Wavelet-based Digital Image Watermarking," Optics Express, p.497, Dec., 1998.
- S. Oh, H. Lee and K. Lee, "A Wavelet Transform based Watermarking for Digital Signatures," Proc. ITU-CSCC 2000, pp. 857-860, 2000.
- A. Kerckhoffs. "La Cryptographic Militaire," Journal des sciences militaires, Vol. 9, pp. 5-38, January 1883.
- M. Kutter and F. Petitcolas. "A Fair Benchmark for Image Watermarking Systems," In Ping Wah Wong and Edward J. Delp. editors, proceedings of electronic imaging '99, security and watermarking of multimedia contents, Vol. 3657, pp. 226-239, January 1999.
- G. Langelaar, R. Lagendijk and J. Biemond, "Real-time labeling of MPEG-2 compressed video", Jour. of Visual Comm. Image Representation, Vol. 9, December 1998
- M. Miller and J. Bloom, "Computing the Probability of False Watermark Detection," Proceeding of Workshop on Information Hiding, pp. 1-15, 1999.
- A. Lewis and G. Knowles, "Image Compression Using the 2-D Wavelet Transform." IEEE Trans. Image Processing, Vol. 1, No. 2, pp. 244-250, April 1992. https://doi.org/10.1109/83.136601
- M. Antonini, M. Barlaud, P. Mathieu and I. Daubechies, "Image Coding Using Wavelet Transform," IEEE Trans. Image Processing, Vol. 1, No. 2, pp. 205-220, April 1992. https://doi.org/10.1109/83.136597