References
- M.U. Celik, G. Sharma, and A.M. Tekalp, "Lossless watermarking for image authentication: A new framework and an implementation," IEEE Transactions on Image Processing, vol. 15, no.4, pp. 1042-1049, April, 2006. https://doi.org/10.1109/TIP.2005.863053
- C.C. Chang, K.F. Hwang, and M.S. Hwang, "Robust authentication Scheme for protecting copyrights of images and graphics," IEE Proceedings - Vision, Image and Signal Processing, vol. 149, no. 1, pp. 43-50, February, 2002. https://doi.org/10.1049/ip-vis:20020372
- Lei, B., Soon, Y., Zhou, F., Li, Z., & Lei, H. "A robust audio watermarking scheme based on lifting wavelet transform and singular value decomposition," Signal Processing, vol. 92, no. 9, pp. 1985-2001, September, 2012. https://doi.org/10.1016/j.sigpro.2011.12.021
- Hu, H. T., & Hsu, L. Y. "Robust, transparent and high-capacity audio watermarking in DCT domain," Signal Processing, vol. 109, pp. 226-235, April, 2015. https://doi.org/10.1016/j.sigpro.2014.11.011
- Khan, A., & Malik, S. A. "A high capacity reversible watermarking approach for authenticating images: exploiting down-sampling, histogram processing, and block selection," Information Sciences, vol. 256, pp. 162-183, January, 2014. https://doi.org/10.1016/j.ins.2013.07.035
- Lee, T. Y., & Lin, S. D. "Dual watermark for image tamper detection and recovery," Pattern recognition, vol. 41, no. 11, pp. 3497-3506, November, 2008. https://doi.org/10.1016/j.patcog.2008.05.003
- Di Martino, F., & Sessa, S., "Fragile watermarking tamper detection with images compressed by fuzzy transform," Information Sciences, vol. 195, pp. 62-90, July, 2012. https://doi.org/10.1016/j.ins.2012.01.014
- Parah, S. A., Sheikh, J. A., Loan, N. A., & Bhat, G. M. "Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing," Digital Signal Processing, vol. 53, pp. 11-24, June, 2016. https://doi.org/10.1016/j.dsp.2016.02.005
- Dutta, T., & Gupta, H. P. "A robust watermarking framework for high efficiency video coding (HEVC)-Encoded video with blind extraction process," Journal of Visual Communication and Image Representation, vol. 38, pp. 29-44, July, 2016. https://doi.org/10.1016/j.jvcir.2015.12.007
- Nguyen, T. S., Chang, C. C., & Huynh, N. T., "A novel reversible data hiding scheme based on difference-histogram modification and optimal EMD algorithm," Journal of Visual Communication and Image Representation, vol. 33, pp. 389-397, November, 2015. https://doi.org/10.1016/j.jvcir.2015.10.008
- Wang, X., Ding, J., & Pei, Q., "A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition," Information Sciences, vol. 310, pp. 16-35, July, 2015. https://doi.org/10.1016/j.ins.2015.03.022
- Nguyen, T. S., & Chang, C. C. "A reversible data hiding scheme based on the Sudoku technique," Displays, vol. 39, pp. 109-116, October, 2015. https://doi.org/10.1016/j.displa.2015.10.003
- Ou, B., Li, X., & Wang, J. "Improved PVO-based reversible data hiding: A new implementation based on multiple histograms modification," Journal of Visual Communication and Image Representation, vol. 38, pp. 328-339, July, 2016. https://doi.org/10.1016/j.jvcir.2016.03.011
- Pan, Z., Hu, S., Ma, X., & Wang, L., "Reversible data hiding based on local histogram shifting with multilayer embedding," Journal of Visual Communication and Image Representation, vol. 31, pp. 64-74, August, 2015. https://doi.org/10.1016/j.jvcir.2015.05.005
- Rad, R. M., Wong, K., & Guo, J. M., "Reversible data hiding by adaptive group modification on histogram of prediction errors," Signal Processing, vol. 125, pp. 315-328, August, 2016. https://doi.org/10.1016/j.sigpro.2016.02.001
- Y. Hu and B. Jeon, "Reversible visible watermarking and lossless recovery of original images," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 11, pp.1423-1429, November, 2006. https://doi.org/10.1109/TCSVT.2006.884011
- C. C. Chang, P. Y. Lin, and J.S. Yeh, "Preserving robustness and removability for digital watermarks using subsampling and difference correlation," Information Sciences, vol. 179, no.13, pp. 2283-2293, June, 2009. https://doi.org/10.1016/j.ins.2009.03.003
- P. P. Zheng, J. Feng, Z. Li, & M. Q. Zhou, "A novel SVD and LS-SVM combination algorithm for blind watermarking," Neurocomputing, vol. 142, pp. 520-528, October, 2014. https://doi.org/10.1016/j.neucom.2014.04.005
- J. M. Guo, H. Prasetyo, "False-positive-free SVD-based image watermarking," Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1149-1163, July, 2014. https://doi.org/10.1016/j.jvcir.2014.03.012
- W. Lu, H. Lu, and F. L. Chung, "Robust digital image watermarking based on subsampling," Applied Mathematics and Computation, vol. 181, no. 2, pp. 886-893, October, 2006. https://doi.org/10.1016/j.amc.2006.02.012