References
- V. Verma and M. J. Singh, "Digital image watermarking techniques: A comparative study," International Journal of Advances in Electrical and Electronics Engineering, vol. 2, no. 1, pp. 173-184, 2013.
- T. Hai, C. M. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122-138, 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
- S. H. Liu, H. X. Yao, W. Gao, and Y. L. Liu, "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007. https://doi.org/10.1016/j.amc.2006.07.036
- T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. https://doi.org/10.1016/j.patcog.2008.05.003
- S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840-847, 2011. https://doi.org/10.1016/j.aeue.2011.01.016
- S. D. Lin, S. C. Shie, and J. Y. Guo, "Improving the robustness of DCT-based image watermarking against JPEG compression," Computer Standards & Interfaces, vol. 32, no. 1-2, pp. 54-60, 2010. https://doi.org/10.1016/j.csi.2009.06.004
- Y. F. Zhu and L. Lin, "Digital image watermarking algorithm based on dual transform domain and selfrecovery," International Journal on Smart Sensing and Intelligent Systems, vol. 8, no. 1, pp. 199-219, 2015. https://doi.org/10.21307/ijssis-2017-755
- V. Solachidis and I. Pitas, "Circularly symmetric watermark embedding in 2-D DFT domain," IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1741-1753, 2001. https://doi.org/10.1109/83.967401
- J. M. Guo and H. Prasetyo, "Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition," AEU - International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, 2014. https://doi.org/10.1016/j.aeue.2014.03.008
- S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014. https://doi.org/10.1016/j.image.2014.09.001
- A. Tiwari and M. Sharma, "Comparative evaluation of semifragile watermarking algorithms for image authentication," Journal of Information Security, vol. 3, no. 3, pp. 189-195, 2012. https://doi.org/10.4236/jis.2012.33023
- W. Y. Zhang and F. Y. Shih, "Semi-fragile spatial watermarking based on local binary pattern operators," Optics Communications, vol. 284, no. 16-17, pp. 3904-3912, 2011. https://doi.org/10.1016/j.optcom.2011.04.004
- T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on featured distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, 1996. https://doi.org/10.1016/0031-3203(95)00067-4
- B. Yang and S. C. Chen, "A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image," Neurocomputing, vol. 120, pp. 365-379, 2013. https://doi.org/10.1016/j.neucom.2012.10.032
- A. Alahmadi, M. Hussain, H. Aboalsamh, G. Muhammad, G. Bebis, and H. Mathkour, "Passive detection of image forgery using DCT and local binary pattern," Signal, Image and Video Processing, vol. 11, no. 1, pp. 81-88, 2017. https://doi.org/10.1007/s11760-016-0899-0
- J. D. Chang, B. H. Chen, and C. S. Tsai, "LBP-based fragile watermarking scheme for image tamper detection and recovery," in Proceedings of the IEEE International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 2013, pp. 173-176.
- S. R. Chalamala and K. R. Kakkirala, "Local binary patterns for digital image watermarking," in Proceedings of the 3rd International Conference on Artificial Intelligence, Modelling and Simulation, Kota Kinabalu, Malaysia, 2015, pp. 159-162.
- Z. J. Liu, L. Xu, T. Liu, H. Chen, P. F. Li, and S. T. Liu, "Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains," Optics Communications, vol. 284, no. 1, pp. 123-128, 2011. https://doi.org/10.1016/j.optcom.2010.09.013