1 |
C. I. Podilchuk and E. J. Delp, "Digital watermarking algorithms and applications," IEEE Signal Processing Magazine, vol. 18, no. 4, pp. 33-46, 2001.
DOI
|
2 |
W. N. Cheung, "Digital image watermarking in spatial and transform domains," in Proceeding of TENCON, Kuala Lumpur, Malaysia, 2000, pp. 374-378.
|
3 |
N. V. Dharwadkar and B. B. Amberker, "An adaptive gray-scale image watermarking scheme using smooth and edge areas of an image," in Proceeding of International Conference on Intelligent Systems and Signal Processing, Gujarat, India 2013, pp. 66-71.
|
4 |
E. Walia and A. Suneja, "Fragile and blind watermarking technique based on Weber's law for medical image authentication," IET Computer Vision, vol. 7, no. 1, pp. 9-19, 2013.
DOI
|
5 |
Y. Rangsanseri, J. Panyavaraporn, P. Thitimajshima, "PCA/wavelet based watermarking of multispectral images," Proceeding of International Symposium on Remote Sensing, Jeju, Korea, 2005.
|
6 |
A. Kaarna and P. Toivanen, "Digital watermarking of spectral images in PCA/wavelet transform domain," in Proceeding of IEEE International Geoscience and Remote Sensing Symposium, Toulouse, France, 2003, pp. 3564-3567.
|
7 |
M. Barni, F. Bartolini, V. Capellini, E. Magli, and G. Olmo, "Near-lossless digital watermarking for copyright protection of remote sensing Images," in Proceeding of IEEE International Geoscience and Remote Sensing Symposium, Toronto, Canada, 2002, pp. 1447-1449.
|
8 |
A. Kunhu and H. Al-Ahmad, "Multi watermarking algorithm based on DCT and hash functions for color satellite images," in Proceedings of the 9th International Conference on Innovations in Information Technology, Abu Dhabi, United Arab Emirates, 2013, pp. 30-35.
|
9 |
N. Divecha and N. N. Jani, "Implementation and performance analysis of DCT-DWT-SVD based watermarking algorithms for color images," in Proceeding of International Conference on Intelligent Systems and Signal Processing, Gujarat, India, 2013, pp. 204-208.
|
10 |
D. Rosiyadi, S. J. Horng, P. Fan, X. Wang, M. K. Khan, and Y. Pan, "Copyright protection for e-government document images," IEEE Multimedia, vol. 19, no. 3, pp. 62-73, 2012.
DOI
|
11 |
S. Majumder, K. J. Devi, and S. K. Sarkar, "Singular value decomposition and wavelet-based iris biometric watermarking," IET Biometrics, vol. 2, no. 1, pp. 21-27, 2013.
DOI
|
12 |
S. Ding, C. Li, and Z. Liu, "Protecting hidden transmission of biometrics using authentication watermarking," in Proceedings of 2010 WASE International Conference on Information Engineering, Beidaihe, China, 2010, pp. 105-108.
|
13 |
S. Bekkouch and K. M. Faraoun, "Robust and reversible image watermarking scheme using combined DCTDWT- SVD transforms," Journal of Information Processing Systems, vol. 11, no. 3, pp. 406-420, 2015.
DOI
|
14 |
B. J. Jang, S. H. Lee, S. Lim, and K. R. Kwon, "Biological infectious watermarking model for video copyright protection," Journal of Information Processing Systems, vol. 11, no. 2, pp. 280-294, 2015.
DOI
|
15 |
M. Benyoussef, S. Mabtoul, M. E. Marraki, and D. Aboutajdine, "Robust ROI watermarking scheme based on visual cryptography: application on mammograms," Journal of Information Processing Systems, vol. 11, no. 4, pp. 495-508, 2015.
DOI
|
16 |
G. Badshah, S. C. Liew, J. M. Zain, and M. Ali, "Secured telemedicine using whole image as watermark with tamper localization and recovery capabilities," Journal of Information Processing Systems, vol. 11, no. 4, pp. 601-615, 2015.
DOI
|
17 |
D. Bouslimi, G. Coatrieux, M. Cozic, and C. Roux, "A joint encryption/watermarking system for verifying the reliability of medical images," IEEE Transactions on Information Technology in Biomedicine, vol. 16, no. 5, pp. 891-899, 2012.
DOI
|
18 |
T. Jassim, R. Abd-Alhameed, and H. Al-Ahmad, "New robust and fragile watermarking scheme for colour images captured by mobile phone cameras," in Proceedings of the 15th International Conference on Computer Modelling and Simulation, Cambridge, UK, 2013, pp. 465-469.
|
19 |
S. Vongpradhip and S. Rungraungsilp, "QR code using invisible watermarking in frequency domain," in Proceedings of the 9th International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, 2011, pp 47-52.
|
20 |
J. Panyavaraporn, P. Horkaew, and W. Wongtrairat, "QR code watermarking algorithm based on wavelet transform," in Proceedings of the 13th International Symposium on Communications and Information Technologies, Surat Thani, Thailand, 2013, pp. 791-796.
|
21 |
M. Saikia and S. Majumder, "A joint SVD based watermarking and encryption scheme using chaotic logistic map," ECTI Transactions on Computer and Information Technology, vol. 9, no. 2, pp. 101-106, 2015.
DOI
|
22 |
P. Khare, A. K. Verma, and V. K. Srivastava, "Digital image watermarking scheme in wavelet domain using chaotic encryption," in Proceedings of 2014 Students Conference on Engineering and Systems, Allahabad, India, 2014, pp. 1-4.
|
23 |
E. Chrysochos, V. Fotopoulos, and A. N. Skodras, "Robust watermarking of digital images based on chaotic mapping and DCT," in Proceedings of the 16th European Signal Processing Conference, Lausanne, Switzerland, 2008, pp. 1-5.
|
24 |
M. Keyvanpour and F. Merrikh-Bayat, "An effective chaos-based image watermarking scheme using fractal coding," Procedia Computer Science, vol. 3, pp. 89-95, 2011.
DOI
|
25 |
S. S. Jamal, T. Shah, and I. Hussain, "An efficient scheme for digital watermarking using chaotic map," Nonlinear Dynamics, vol. 73, no. 3, pp 1469-1474, 2013.
DOI
|
26 |
R. Esgandari, M. S. Student, and M. Khalili, "A robust image watermarking scheme based on discrete wavelet transforms," in Proceedings of the 2nd International Conference on Knowledge-Based Engineering and Innovation, Tehran, Iran, 2015, pp. 988-992.
|
27 |
S. Mohammadi and S. Talebi, "An image watermarking algorithm based on chaotic maps and wavelet transform," in Proceedings of the 9th International ISC Conference on Information Security and Cryptology, Tabriz, Iran, 2012, pp. 135-140.
|
28 |
Wikipedia, "Lorenz equations," [Online]. Available: https://en.wikipedia.org/wiki/Lorenz_system.
|