1 |
Y. P. Xu and L. Q. Jia, "Research of a digital watermarking algorithm based on discrete cosine transform," in Proceedings of the 3rd International Symposium on Electronic Commerce and Security Workshops (ISECS'10), Guangzhou, China, 2010, pp. 373-375.
|
2 |
C. M. Pun and I. T. Lam, "Fingerprint watermark embedding by discrete cosine transform for copyright ownership authentication," International Journal of Communications, vol. 3, no. 1, pp. 17-24, 2009.
|
3 |
Y. I. Khamlichi, M. Machkour, K. Afdel, and A. Moudden, "Medical image watermarked by simultaneous moment invariants and content-based for privacy and tamper detection," in Proceedings of the 6th WSEAS International Conference on Multimedia Systems & Signal Processing, Hangzhou, China, 2006, pp. 16-18.
|
4 |
P. K. Dhar, M. I. Khan, and J. M. Kim, "A new audio watermarking system using discrete Fourier transform for copyright protection," International Journal of Computer Science and Network Security, vol. 10, no. 6, pp. 35-40, 2010.
|
5 |
C. C. Chang, P. Tsai, and C. C. Lin, "SVD-based digital image watermarking scheme," Pattern Recognition Letters, vol. 26, no. 10, pp. 1577-1586, 2005.
DOI
|
6 |
H. Demirel, C. Ozcinar, and G. Anbarjafari, "Satellite image contrast enhancement using discrete wavelet transform and singular value decomposition," IEEE Geoscience and Remote Sensing Letters, vol. 7, no. 2, pp. 333-337, 2010.
DOI
|
7 |
I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking. San Francisco, CA: Morgan Kaufmann Publishers, 2001.
|
8 |
O. M. Al-Qershi and B. E. Khoo, "Authentication and data hiding using a reversible ROI-based watermarking scheme for DICOM images," Proceedings of World Academy of Science, Engineering and Technology, vol. 38, pp. 829-834, 2009.
|
9 |
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, 1997.
DOI
|
10 |
A. Piva, M. Barni, F. Bartolini, and V. Cappellini, "DCT-based watermark recovering without resorting to the uncorrupted original image," in Proceedings of International Conference on Image Processing, Santa Barbara, CA, 1997, pp. 520-523.
|
11 |
D. H. Kekre, D. T. Sarode, and S. Natu, "Robust watermarking scheme using column DCT wavelet transform under various attacks," International Journal on Computer Science and Engineering, vol. 6, no. 1, pp. 31-41, 2014.
|
12 |
J. Abraham and V. Paul, "Image watermarking using DCT in selected pixel regions," in Proceedings of 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kanyakumari, India, 2014, pp. 398-402.
|
13 |
Y. Han, W. He, S. Ji, and Q. Luo, "A digital watermarking algorithm of color image based on visual cryptography and discrete cosine transform," in Proceedings of 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), Guangdong, China, 2014, pp. 525-530.
|
14 |
P. Tao and A. M. Eskicioglu, "A robust multiple watermarking scheme in the discrete wavelet transform domain," in Internet Multimedia Management Systems V. Bellingham, WA: International Society for Optical Engineering, 2004, pp. 133-144.
|
15 |
M. Agoyi, E. Celebi, and G. Anbarjafari, "A watermarking algorithm based on chirp z-transform, discrete wavelet transform, and singular value decomposition," Signal, Image and Video Processing, vol. 9, no. 3, pp. 735-745, 2015.
DOI
|
16 |
M. Ali and C. W. Ahn, "An optimized watermarking technique based on self-adaptive DE in DWT-SVD transform domain," Signal Processing, vol. 94, pp. 545-556, 2014.
DOI
|
17 |
R. Liu and T. Tan, "An SVD-based watermarking scheme for protecting rightful ownership," IEEE Transactions on Multimedia, vol. 4, no. 1, pp. 121-128, 2002.
DOI
|
18 |
D. S. Chandra, "Digital image watermarking using singular value decomposition," in Proceedings of the 45th Midwest Symposium on Circuits and Systems (MWSCAS-2002), Tulsa, Oklahoma, 2002, pp. 264-267.
|
19 |
Y. R. Rao, E. Nagabhooshanam, and N. Prathapani, "Robust video watermarking algorithms based on SVD transform," in Proceedings of 2014 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 2014, pp. 1-5.
|
20 |
K. Meenakshi, C. S. Rao, and K. S. Prasad, "A robust watermarking scheme based Walsh-Hadamard transform and SVD using ZIG ZAG scanning," in Proceedings of 2014 International Conference on Information Technology (ICIT), Bhubaneswar, India, 2014, pp. 167-172.
|
21 |
H. Shi, F. Lv, and Y. Cao, "A blind watermarking technique for color image based on SVD with circulation," Journal of Software, vol. 9, no. 7, pp. 1749-1756, 2014.
|
22 |
M. S. Hsieh, "Wavelet-based image watermarking and compression," doctoral dissertation, Institute of Computer Science and Information Engineering, National Central University, Taiwan, 2001.
|
23 |
B. Aiazzi, L. Alparone, and S. Baronti, "Near-lossless compression of 3-D optical data," IEEE Transactions on Geoscience and Remote Sensing, vol. 39, no. 11, pp. 2547-2557, 2001.
DOI
|
24 |
M. Awasthi and H. Lodhi, "Robust image watermarking based on discrete wavelet transform, discrete cosine transform & singular value decomposition," Advance in Electronic and Electric Engineering, vol. 3, no. 8, pp. 971-976, 2013.
|
25 |
F. K. Mohamed and R. Abbes, "RST Robust watermarking schema based on image normalization and DCT decomposition," Malaysian Journal of Computer Science, vol. 20, no. 1, pp. 77-90, 2007.
DOI
|