References
- G. T. Oh, Y. B. Lee and S. J. Yeon, "Security Mechanism for Medical Image Information on PACS Using Invisible Watermark," in Proceedings of the International Conference on High Performance Computing for Computational Science 2004, pp. 315-324, 2004.
- E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," in Proceedings of the Electronic Imaging. International Society for Optics and Photonics, pp. 152-163, 2003.
- M. Awrangjeb, "An Overview of Reversible Data Hiding," in Proceedings of the Sixth International Conference on Computer and Information Technology, pp.75-79, 2003.
- X. Q. Zhou, H. K. Huang and S. L. Lou, "Authenticity and integrity of digital mammography images," IEEE Transactions on Medical Imaging, vol. 20, no. 8, pp. 784- 791, Aug. 2001. https://doi.org/10.1109/42.938246
- K. F. Li, T. S. Chen and S. C. Wu, "Image tamper detection and recovery system based on discrete wavelet transform," in Proceedings of the IEEE Pacific Rim Conference, vol. 1, no. 8, pp.164-167, 2001.
- I. J. Cox, M. l. Miller and J. A. Bloom, "Watermarking applications and their Properties," in Proceedings of the Information Technology:Coding and Computing 2000, pp. 6-10, 2000.
- J. J. Eggers, J. K. Su, and B. Girod, "Performance of a practical blind watermarking scheme," in Proceedings of the Photonics West 2001-Electronic Imaging, vol. 4314, pp. 594-605, 2001.
- S. Milani, M, Fontani., P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, and S. Tubaro, "An overview on video forensics," in Proceeding of Signal Proceedings Conference, pp. 1229-1233, 2012.
- S.Y Tak, J.M Ban, S Lew, W.J Lee, B.R Lee and H.CKang, "A Study on an Image Stabilization in Moving Vehicle," International Journal of The Institute of Electronics Engineers, vol. 49, no. 4, pp. 95-104, Jun. 2012.
- S. D. Lin, and Z. L Yang, "Hierarchical Fragile Watermarking Scheme for Image Authentication," International Journal of Intelligent Automation & Soft Computing, vol. 17, no.2 , pp. 245-255, Mar. 2011. https://doi.org/10.1080/10798587.2011.10643146
- R. Amirtharajan, and J. B. B. Rayappan, "Brownian motion of binary and gray-binary and gray bits in image for stego," International Journal of Applied Sciences, vol.12, no.5, pp. 428-439, May. 2012. https://doi.org/10.3923/jas.2012.428.439
- M. U. Celik, G. Sharma, A. M. Tekalp and E. Saber, "Lossless generalized-LSB data embedding," IEEE Transactions on Image Processing, vol.14, no.2, pp.253- 266, Feb. 2005. https://doi.org/10.1109/TIP.2004.840686
- S. Lee, C. D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, vol.2, no.3, pp.321- 330, Sept. 2007. https://doi.org/10.1109/TIFS.2007.905146
- H. J. Kim, S. Xiang and I. K. Yeo. "Robustness analysis of patchwork watermarking schemes," in Digital Audio Watermarking Techniques and Technologies:Applications and Benchmarks. IGI Global, pp. 172-186, 2008.