References
- J. Kim, N. Kim, D. Lee, S. Park and S. Lee, "Watermarking two dimensional data object identifier for authenticated distribution of digital multimedia contents," Signal Processing: Image Communication, vol. 25, no. 8, pp. 559-576, September, 2010. https://doi.org/10.1016/j.image.2010.07.004
- G. RoslineNesaKumari, B. VijayaKumar, L. Sumalatha and V. V. Krishna, "Secure and Robust Digital Watermarking on Grey Level Images," International Journal of Advanced Science and Technology, vol. 11, pp. 1-8, October, 2009.
- D. Li and J. Kim, "Secure Image Forensic Marking Algorithm using 2D Barcode and Off-axis Hologram in DWT-DFRNT Domain," Applied Mathematics & Information Sciences, vol. 6, no. 2, pp. 513-520, January, 2012.
- J. Nah, J. Kim and J. Kim, "Video Forensic Marking Algorithm Using Peak Position Modulation," Applied Mathematics & Information Sciences, vol. 7, no. 6, pp. 2391-2396, November, 2013. https://doi.org/10.12785/amis/070632
- S. Kim, S. H. Lee, and Y. M. Ro, "Rotation and flipping robust region binary patterns for video copy detection," Journal of Visual Communication and Image Representation, vol. 25, no.2, pp. 373-383, February, 2014. https://doi.org/10.1016/j.jvcir.2013.12.003
- M. M. Sathik and S. S. Sujatha, "Wavelet Based Blind Technique by Espousing Hankel Matrix for Robust Watermarking," International Journal of Advanced Science and Technology, vol. 26, pp. 57-72, January, 2011.
- X. Jin and J. Kim, "Robust Digital Watermarking for High-Definition Video using Steerable Pyramid Transform and Fast Fourier transformation," in Proc. of Proceedings of the 4th International Conference on Digital Contents and Applications, Jeju, Korea, vol. 120, December 16-19, 2015.
- C. Qin, X. Chen, D. Ye, J. Wang and X. Sun, "A Novel Image Hashing Scheme with Perceptual Robustness Using Block Truncation Coding," Information Sciences, vol. 361-362, no. 20, pp. 84-99, September, 2016. https://doi.org/10.1016/j.ins.2016.04.036
- C. Qin, P. Ji, X. Zhang, J. Dong and J. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, September, 2017. https://doi.org/10.1016/j.sigpro.2017.03.033
- C. Qin and X. Zhang, "Effective Reversible Data Hiding in Encrypted Image with Privacy Protection for Image Content," Journal of Visual Communication and Image Representation, vol. 31, pp. 154-164, August, 2015. https://doi.org/10.1016/j.jvcir.2015.06.009
- R. B. Narute and S. R. Patil, "Invisible Video Watermarking for Secure Transmission Based on DWT and PCA Mechanism," International Journal of Innovative Research in Science, Engineering and Technology, vol. 6, no. 6, pp. 12128-12135, June, 2017.
- R. Srivastava, "Dwt based Invisible Watermarking on Images," International Journal of Advance Research, Ideas and Innovations in Technology, vol. 3, no. 1, pp. 70-74, January, 2017.
- N. Asha and P. Bhagya, "Video Watermarking using DWT and Alpha Blending Technique," International Journal of Advanced Research in Computer and Communication Engineering, vol. 6, no. 5, pp. 348-352, May, 2017.
- G. Gupta and H. Aggarwal, "Digital image Watermarking using Two Dimensional Discrete Wavelet Transform, Discrete Cosine Transform and Fast Fourier Transform," International Journal of Recent Trends in Engineering, vol. 1, no. 1, pp. 616-618, May, 2009.
- C. V. Loan, "Computational Frameworks for the Fast Fourier Transform," Society for Industrial and Applied Mathematics, USA, 1992.
- D. N. Rockmore, "The FFT: an algorithm the whole family can use," Computing in Science & Engineering, vol. 2, no. 1, pp. 60-64, January, 2000. https://doi.org/10.1109/5992.814659
- I. H. Sarker, M. I. Khan, K. Deb and F. Faruque, "FFT-Based Audio Watermarking Method with a Gray Image for Copyright Protection," International Journal of Advanced Science and Technology, vol. 47, pp. 65-76, October, 2012.
- A. Hossaini, M. Aroussi, K. Jamali, S. Mbarki, and M. Wahbi, "A New Robust Blind Watermarking Scheme Based on Steerable pyramid and DCT using Pearson product moment correlation," Journal of Computers, vol. 9, no. 10, pp. 2315-2327, October, 2014.
- F. Drira, F. Denis, and A. Baskurt, "Image watermarking technique based on the steerable pyramid transform," in Proc. of 2004 SPIE, pp. 165-176, November, 2004.
- A. Karasaridis and E. P. Simoncelli, "A Filter Design Technique for Steerable Pyramid Image Transforms," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Atlanta, GA, May 9-9, 1996.
- W. T. Freeman and E. H. Adelson, "The Design and Use of Steerable Filters," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 13, no. 9, pp. 891-906, September, 1991. https://doi.org/10.1109/34.93808
- E. P. Simoncelli and W. T. Freeman, "The steerable pyramid: a flexible architecture for multi-scale derivative computation," in Proc. of International Conference on Image Processing, Washington, DC, October 23-26, 1995.
- T. Kajdanowicz and P. Kazienko, "Multi-label classification using error correcting output codes," Int. J. Appl. Math. Comput. Sci., vol. 22, no. 4, pp. 829-840, December, 2012. https://doi.org/10.2478/v10006-012-0061-2
- S. Amornsamankul, J. Promrak, and P. Kraipeerapun, "Solving Multiclass Classification Problems using Combining Complementary Neural Networks and Error-Correcting Output Codes," International Journal of Mathematics and Computers in Simulation, vol. 5, no. 3, pp. 266-273, January, 2011.
- T. Li, S. Zhu and M. Ogihara, "Using discriminant analysis for multi-class classification: an experimental investigation," Knowledge and Information Systems, vol. 10, no. 4, pp. 453-472, November, 2006. https://doi.org/10.1007/s10115-006-0013-y
- C. Moulin, C. Largeron, C. Ducottet, M. Gery and C. Barat, "Fisher Linear Discriminant Analysis for text-image combination in multimedia information retrieval," Pattern Recognition, vol. 47, no. 1, pp. 260-269, January, 2014. https://doi.org/10.1016/j.patcog.2013.06.003
- H. Fleyeh and E. Davami, "Multiclass Adaboost Based on an Ensemble of Binary AdaBoosts," American Journal of Intelligent Systems, vol. 3, no, 2, pp. 57-70, September, 2013.
- R. Appel, T. Fuchs, P. Dollar and P. Perona, "Quickly Boosting Decision Trees - Pruning Underachieving Features Early," in Proc. of Proceedings of the 30th International Conference on Machine Learning, Atlanta, USA, vol. 28, pp. 594-602, June 16-21, 2013.