1 |
D.Bhowmik, C.Abhayaratne, "Quality scalability aware watermarking for visual content," IEEE Transactions on Image Processing, vol.25, no.11, pp.5158-5172, November, 2016.
DOI
|
2 |
J.X Wang, J.Q Ni, X. Zhang, and Y.Q Shi, "Rate and distortion optimization for reversible data hiding using multiple histogram shifting," IEEE Transactions on Cybernetics, vol.47, no.2, pp.315-326, February, 2017.
DOI
|
3 |
J.T Zhou, W.W Sun, L. Dong, X.M Liu,Oscar C.Au,and Y.Y Tang, "Secure reversible image data hiding over encrypted domain via key modulation," IEEE Transactions on Circuits and Systems for Video Technology, vol.26, no.3, pp.441-451, March, 2016.
DOI
|
4 |
G. C. Langelaar, I. Setyawan, R. L. Lagendijk, "Watermarking digital image and video data: A state-of-the-art overview,"IEEE Transactions on Signal Processing Magazine,vol.17, no.5, pp.20-46, September, 2000.
|
5 |
C.J.Cheng, W.Hwang, H.Zeng,Y.Lin, "A fragile watermarking algorithm for hologram authentication,"Journal of Display Technology, vol.10, no.4, pp.263-271, April, 2014.
DOI
|
6 |
S.Lee, C.D.Yoo, T.Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, vol.2, no.3, pp.321-330, September, 2007.
DOI
|
7 |
Y.Bian, S.Liang, "Image watermark detection in the wavelet domain using Bessel K densities,"IET Image Processing, vol.7, no.4, pp.281-289, June, 2013.
DOI
|
8 |
I.J.Cox, J.Kilian, T.Leighton,"Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol.6, no.12, pp. 1673-1687, December, 1997.
DOI
|
9 |
N. Bi,Q.Y Sun,D. Huang, Z.H Yang, and J.W Huang, "Robust image watermarking based on multiband wavelets and empirical mode decomposition," IEEE Transactions on Image Processing, vol.16, no.8, pp.1956-1967, August, 2007.
DOI
|
10 |
C.Zhang, L.L.Cheng, Z.Qiu,L.M.Cheng, "Multipurpose watermarking based on multiscale curvelet transform," IEEE Transactions on Information Forensics and Security, vol.3, no.4, pp.611-619, December, 2008.
DOI
|
11 |
M.Rahman,M.O.Ahmad, M. N. S. Swamy, "A new statistical detector for DWT-based additive image watermarking using the Gauss-Hermite expansion," IEEE Transactions on Image Processing, vol.18, no.8, pp.1782-1796, August, 2009.
DOI
|
12 |
H.Sadreazami,M. O. Ahmad, M. N. S. Swamy,"A study of multiplicative watermark detection in the contourlet domain using alpha stable distributions," IEEE Transactions on Image Processing, vol.23, no.10, pp.4348-4360, October, 2014.
DOI
|
13 |
H.Sadreazami,M. O. Ahmad, M. N. S. Swamy,"A robust multiplicative watermark detector for color images in sparse domain," IEEE Transactions on Circuits and Systems-II :Express Briefs, vol.62, no.12, pp.1159-1163, December, 2015.
DOI
|
14 |
M.A.Akhaee, S.M.E.Sahraeian, B.Sankur,etal., "Robust scaling-based image watermarking using maximum-likelihood decoder with optimum strength factor," IEEE Transactions on Multimedia, vol.11, no.5, pp.822-833, August, 2009.
DOI
|
15 |
Q.Li, I.J.Cox, "Using perceptual models to improve fidelity and provide resistance to valumetric scaling for quantization index modulation watermarking," IEEE Transactions on Information Forensics and Security, vol.2, no.2, pp.127-139, June, 2007.
DOI
|
16 |
M.Zareian, H.R.Tohidypour, "A novel gain invariant quantization-based watermarking approach," IEEE Transactions on Information Forensics and Security, vol.9, no.11, pp.1804-1813, November, 2014.
DOI
|
17 |
M.A.Akhaee, S.M.E.Sahraeian, F.Marvasti, "Contourlet-based image watermarking using optimum detector in noisy environment," IEEE Transactions on Image Processing, vol.19, no.4, pp.967-980, April, 2010.
DOI
|
18 |
N.K.Kalantari, S.M.Ahadi, M.Vafadust, "A robust image watermarking in the ridgelet domain using universally optimum decoder,"IEEE Transactions on Circuits and Systems for Video Technology, vol.20, no.3, pp.396-406, March, 2010.
DOI
|
19 |
L. Demanet, L.X Ying, "Wave atoms and time upscaling of wave equations," Numerische Mathematik, vol.113,no.1,pp.1-71,May, 2009.
DOI
|
20 |
M.N.Do, M.Vetterli, "The contourlet transform: An efficient directional multiresolution image representation,"IEEE Transactions Image Processing, vol.14, no.12, pp.2091-2106, December, 2005.
DOI
|
21 |
H.Sadreazami, M. O. Ahmad, M. N. S. Swamy, "Multiplicative watermark decoder in contourlet domain using the normal inverse gaussian distribution," IEEE Transactions on Multimedia, vol.18, no.2, pp.196-207, February, 2016.
DOI
|
22 |
I.W Selesnick, R.G. Baraniuk, N.G. Kingsbury, "The dual-tree complex wavelets transform- a coherent framework for multi-scale signal and image processing," IEEE Signal Processing Magazine, vol.22, no.6, pp.123-151, July, 2005.
DOI
|
23 |
L.E.Coria, M.R. Pickering,P.Nasiopoulos, R.K.Ward, "A video watermarking scheme based on the dual-tree complex wavelet transform," IEEE Transactions on Information Forensics and Security, vol.3, no.3, pp.466-474, September, 2008.
DOI
|
24 |
T. M. Ng, H. K. Garg, "Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling," IEEE Signal Processing Letters, vol.12, no.4, pp.345-348, April, 2005.
|
25 |
Z. Wang, A. C. Bovik, H. R. Sheikh, et al., "Image quality assessment: from error visibility to structural similarity,"IEEE Transactions on Image Processing, vol.13, no.4, pp.600-612, April, 2004.
DOI
|
26 |
M. P. Sampat, Z. Wang, S. Gupta, A. C. Bovik,M. K. Markey, "Complex wavelet structural similarity: A new image similarity index," IEEE Transactions on Image Processing, vol.18, no.11, pp.2385-2401, November, 2009.
DOI
|
27 |
F. Gembicki, Y. Haimes, "Approach to performance and sensitivity multi-objective optimization: The goal attainment method," IEEE Transactions on Automatic Control, vol.20, no.6, pp.769-771, December,1975.
DOI
|
28 |
N.Yadav, K.Singh, "Robust image adaptive watermarking using an adjustable dynamic strength factor," Signal,Image and Video Processing, vol.9, no.7, pp. 1531-1542, October, 2015.
DOI
|
29 |
N.K.Kalantari, S.M. Ahadi, "A logarithmic quantization index modulation for perceptually better data hiding," IEEE Transactions on Image Processing, vol.19, no.6, pp.1504-1518, June, 2010.
DOI
|
30 |
H.Kandi,D.Mishra,S.R.S.Gorthi, "Exploring the learning capabilities of convolutional neural networks for robust image watermarking," Computer & Security, vol.65, pp.247-268, March,2017.
DOI
|
31 |
A.B. Watson, G.Y. Yang, J.A. Solomon, et al., "Visibility of wavelet quantization noise," IEEE Transactions on Image Processing, vol.6, no.8, pp.1164-1175, August, 1997.
DOI
|
32 |
J.S.Zeng, S.Q.Tan, B.Li, J.W.Huang, "Large-scale JPEG image steganalysis using hybrid deep-learning framework," IEEE Transactions on Information Forensics and Security, vol.13, no.5, pp.1200-1214, May, 2018.
DOI
|