References
- W. R. Bender, D. Gruhl, and N. Morimoto, "Techniques for data hiding," in Proceedings of SPIE 2420: Storage and Retrieval of Image and Video Database III. Bellingham, WA: International Society for Optics and Photonics, 1995.
- M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia data embedding and watermarking technologies," Proceedings of the IEEE, vol. 86, no. 6, pp. 1064-1087, 1998. https://doi.org/10.1109/5.687830
- Z. H. Wei, P. Qin, and Y. Q. Fu, "Perceptual digital watermark of images using wavelet transform," IEEE Transactions on Consumer Electronics, vol. 44, no. 4, pp. 1267-1272, 1998. https://doi.org/10.1109/30.735826
- N. Kaewkamnerd and K. R. Rao, "Wavelet based image adaptive watermarking scheme," Electronics Letters, vol. 36, no. 4, pp. 312-313, 2000. https://doi.org/10.1049/el:20000269
- M. S. Hsieh, D. C. Tseng, and Y. H. Huang, "Hiding digital watermarks using multiresolution wavelet transform," IEEE Transactions on Industrial Electronics, vol. 48, no. 5, pp. 875-882, 2001. https://doi.org/10.1109/41.954550
- J. Huang and C. Yang, "Image digital watermarking algorithm using multiresolution wavelet transform," in Proceedings of 2004 IEEE International Conference on Systems, Man and Cybernetics, Hague, Netherlands, 2004, pp. 2977-2982.
- K. H. Lee, Y. H. Kim, and T. H. Yi, "A robust pattern digital watermarking method using wavelet transform," Journal of Korea Multimedia Society, vol. 7, no. 1, pp. 98-105, 2004.
- H. Wang and N. Li, "An algorithm of digital image watermark based on multiresolution wavelet analysis," in Proceedings of 2005 IEEE International Workshop on VLSI Design and Video Technology, Suxhou, China, 2005, pp. 272-275.
- M. Shinohara, F. Motoyoshi, O. Uchida, and S. Nakanishi, "Wavelet-based robust digital watermarking considering human visual system," in Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, 2007, pp. 177-180.
- K. Ramanjaneyulu and K. Rajarajeswari, "Wavelet-based oblivious image watermarking scheme using genetic algorithm," IET Image Processing, vol. 6, no. 4, pp. 364-373, 2012. https://doi.org/10.1049/iet-ipr.2010.0347
- J. Hwang, J. Kim, and J. Choi, "A reversible watermarking based on histogram shifting," in Digital Watermarking. Heidelberg: Springer, 2006, pp. 348-361.
- Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354-362, 2006. https://doi.org/10.1109/TCSVT.2006.869964
- Z. Ni, Y. Q. Shi, N. Ansari, W. Su, Q. Sun, and X. Lin, "Robust lossless image data hiding designed for semifragile image authentication," IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 4, pp. 497-509, 2008. https://doi.org/10.1109/TCSVT.2008.918761
- X. T. Zeng, X. Z. Pan, and Z. Li, "Robust lossless data hiding scheme," Journal of Zhejiang University Science C, vol. 11, no. 2, pp. 101-110, 2010. https://doi.org/10.1631/jzus.C0910177
- M. S. Hsieh, "A robust image authentication method based on wavelet transform and Teager energy operator," International Journal of Multimedia and Its Applications, vol. 2, no. 3, pp. 1-17, 2010. https://doi.org/10.5121/ijma.2010.2301
- M. D. Adams, "JasPer software reference manual," 2001; http://iie.fing.edu.uy/ense/asign/codif/material/laboratorio/jpeg_2000/doc/jasper.pdf.