References
- I.J. Cox et al., Digital Watermarking and Steganography, 2nd ed., Burlington, MA: Morgan Kaufmann Publishers, 2008.
- F.Y. Shih, Digital Watermarking and Steganography: Fundamentals and Techniques, Boca Raton, FL: CRC Press, 2008.
- S. Wang, B. Yang, and X. Niu, "A Secure Steganography Method Based on Genetic Algorithm," J. Inf. Hiding Multimedia Signal Process., vo1. 1, no. 1, 2010, pp. 28-35.
- C.Y. Yang and C.H. Lin, "High-Quality and Robust Reversible Data Hiding by Coefficients Shifting Algorithm," ETRI J., vol. 34, no. 3, June 2012, pp. 429-438. https://doi.org/10.4218/etrij.12.0111.0312
- C.Y. Yang et al., "A Simple Digital Watermarking by the Adaptive Bit-Labeling Scheme," Int. J. Innovative Comput., Info. Control, vol. 6, no. 3(B), 2010, pp. 1401-1410.
- R.M. Noriega et al., "High Payload Audio Watermarking: Toward Channel Characterization of MP3 Compression," J. Inf. Hiding Multimedia Signal Process., vol. 2, no. 2, 2011, pp. 91- 107.
- C.Y. Yang, "Color Image Steganography Based on Module Substitutions," Third Int. Conf. Int. Inf. Hiding Multimedia Signal Process., Kaohsiung, Taiwan, Nov. 26-28, 2007, pp. 118-121.
- Y.G. Fu and R.M. Shen, "Color Image Watermarking Scheme Based on Linear Discriminant Analysis," Comput Std. Interface, vol. 30, 2009, pp. 115-120.
- O. Findik, I. Babaoglu, and E. Ülker, "A Color Image Watermarking Scheme Based on Artificial Immune Recognition System," Expert Syst. Appl., vol. 38, 2011, pp. 1942-1946. https://doi.org/10.1016/j.eswa.2010.07.126
- A. Phadikar and S.P. Maity, "Quality Access Control of Compressed Color Images Using Data Hiding," Int. J. Electron. Comnun, vol. 64, 2010, pp. 833-843. https://doi.org/10.1016/j.aeue.2009.09.004
- Q. Su et al., "A Blind Dual Color Images Watermarking Based on IWT and State Coding," Optics Commun., vol. 285, 2012, pp. 1717-1724. https://doi.org/10.1016/j.optcom.2011.11.117
- A. Mitiche and J.K. Aggarwal, "Contour Registration by Shape- Specific Point for Shape Matching," Comp. Vision, Graph. Image Process., vol. 22, 1983, pp. 396-408. https://doi.org/10.1016/0734-189X(83)90084-1
- J.C. Lin, S.L Chou, and W.H. Tsai, "Detection of Rotationally Symmetric Shape Orientations by Fold-Invariant Shape-Specific Points," Pattern Recog., vol. 25, 1992, pp. 473-482. https://doi.org/10.1016/0031-3203(92)90046-L
- C.Y. Yang and J.C. Lin, "EBTC: An Economical Method for Searching the Threshold of BTC Compression," Electron. Lett., vol. 32, 1996, pp. 1870-1871. https://doi.org/10.1049/el:19961267
- C.Y. Yang and J.C. Lin, "RWM-Cut for Color Image Quantization," Comput. Graph., vol. 20, 1996, pp. 577-588. https://doi.org/10.1016/0097-8493(96)00028-3
Cited by
- An improved robust watermarking scheme based on a shape-specific point and feature-embedding technique vol.63, pp.4, 2013, https://doi.org/10.1179/1743131x14y.0000000096
- Effective Electrocardiogram Steganography Based on Coefficient Alignment vol.40, pp.3, 2013, https://doi.org/10.1007/s10916-015-0426-9
- Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment vol.76, pp.1, 2017, https://doi.org/10.1007/s11042-015-3065-8
- Robust watermarking technique for textured images vol.125, pp.None, 2013, https://doi.org/10.1016/j.procs.2017.12.025
- Simple and robust watermarking scheme based on square-root-modulus technique vol.77, pp.23, 2013, https://doi.org/10.1007/s11042-018-6121-3