References
- P. Meerwald and A. Uhl, "A Survey of Wavelet-domain Watermarking Algorithms", Security and watermarking of multimedia contents III, Proceedings of SPIE vol.4314, pp.505-516, 2001.
- I. J. Cox, M. L. Miller and J. A. Bloom, Digital Watermarking, Morgan Kaufmann Publishers, 2001.
- M. Al-Mohimeed, "Wavelet-based Digital Watermarking", Security and watermarking of multimedia contents III, Proceedings of SPIE vol.4314, pp.418-423, 2001.
- Chien Chang Chen and De-Sheng Kao, "DCT Based Reversible Image Watermarking Approach", Third IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.482-492, 2007.
- I. Cox, J. Kilian, T. Leighton, T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image Processing, vol.6 no.12, pp.1673-1687, Dec 1997. https://doi.org/10.1109/83.650120
- Y. Yang, X. Sun, H. Yang, and C.T. Li, "A Removable Visible Image Watermarking Algorithm in DCT Domain," Journal of Electronic Imaging, Vol. 17, No. 3, pp.033008-1-033008-11, July-September, 2008. https://doi.org/10.1117/1.2952843
- V. S. Jabede, S. R. Gengaje, "Literature Review of Wavelet based Digital Imgae Watermarking Techniques," International Journal of Computer Applications, Vol.31, No.1, pp.28-35 Oct. 2011. https://doi.org/10.5120/3790-5218
- A. S. Lewis, G. Knowles, "Image Compression using the 2-D Wavelet Transform," IEEE Transactions on image Processing, pp.244-250, Apr. 1992.
- Hai Tao, Li Chongmin,Jasni Mohamad Zain, Ahmed N. Abdalla, "Robust Image Watermarking Theories and Techniques: A Review,"Journal of Applied Research and Technology, vol.12 pp.122-136, Feb. 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
- M. Barni, F. Bartolini, A. De Rosa, Piva A, "Capacity of the Watermark Channel: How many bits can be hidden within a digital image?," Security and Watermarking of Multimedia Contents, 1999, Proceedings of SPIE 3657, pp.437-448.
- W. C. Ku, T. C. Chou, H. L. Wu, J. C. Chang, "A fragile watermarking scheme for Image Authentication with Tamper Detection and Localization," 2010 Fourth International Conference on Genetic and Evolutionary Computing, Dec. 2010, pp.638-641
- M. Barni, F. Bartolini and A. Piva, "Improved Wavelet-based Watermarking Through Pixel-wise Masking", IEEE Trans. on Image Processing, Vol.10, No.5, pp.783-791, May 2001. https://doi.org/10.1109/83.918570
- E. Houssein, M. Ali and A. E. Hassanien, "An Image Steganography Algorithm using Haar Discrete Wavelet Transform with Advanced Encryption System", Proceedings of the Federated Conference on Computer Science and Information System pp.641-644, 2016.
- M. Antonini, M. Barlaud, "Image Coding Using Wavelet Transform", IEEE Trans. on Image Processing, Vol. 1, No. 2, pp.205-220, April 1992. https://doi.org/10.1109/83.136597
- D. Kundur and D. Hatzinakos, "Digital Watermarking using Multiresolution Wavelet Decomposition", Proceedings of the 1998 IEEE International Conference Acoustic, Speech, Signal Processing, Vol. 5, pp.2969-2972.
- Ester Yen, Kai-Shiang Tsai,"HDWT-based Grayscale Watermark For Copyright Protection", Expert Systems with Applications 35, Elsevier, pp.301-306, 2008, . https://doi.org/10.1016/j.eswa.2007.06.040
- A. A. Reddy, B. N. Chatterji, "A new Wavelet based Logo-watermarking Scheme", Pattern Recognition Letters, Vol.26, Issue7, pp.1019-1027, May 2005. https://doi.org/10.1016/j.patrec.2004.09.047
- S. H. Wang and Y. P. Lin, "Wavelet Tree Quantization for Copyright Protection Watermarking", IEEE Trans. On Image Processing, Vol.13, No.2, pp.154-165, Feb. 2004. https://doi.org/10.1109/TIP.2004.823822
- Z. Yuefeng and L. Li,"Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-recovery", International Journal on Smart Sensing & Intelligent Systems, Vol.8 Issue 1, pp.199-219, Mar. 2015. https://doi.org/10.21307/ijssis-2017-755