1 |
M. W. Hatoum, J.-F. Couchot, R. Couturier, and R. Darazi, "Using Deep learning for image watermarking attack," Signal Process. Image Commun., p. 116019, 2020.
DOI
|
2 |
A. Rahman, "Optimum information embedding in digital watermarking," J. Intell. Fuzzy Syst., vol. 37, no. 1, pp. 553-564, 2019.
DOI
|
3 |
P. Vaidya and C. M. PVSSR, "A robust semi-blind watermarking for color images based on multiple decompositions," Multimed. Tools Appl., vol. 76, no. 24, pp. 25623-25656, 2017.
DOI
|
4 |
C. Kant and S. Chaudhary, "A Watermarking Based Approach for Protection of Templates in Multimodal Biometric System," Procedia Comput. Sci., vol. 167, pp. 932-941, 2020, doi: 10.1016/j.procs.2020.03.392.
DOI
|
5 |
E. Candes, L. Demanet, D. Donoho, and L. Ying, "Fast discrete curvelet transforms," Multiscale Model. Simul., vol. 5, no. 3, pp. 861-899, 2006.
DOI
|
6 |
"CVG - UGR - Image database." https://ccia.ugr.es/cvg/dbimagenes/c512.php (accessed Mar. 11, 2021).
|
7 |
D. Liu, Z. Yuan, and Q. Su, "A blind color image watermarking scheme with variable steps based on Schur decomposition," Multimed. Tools Appl., pp. 1-23, 2019.
|
8 |
A. M. Cheema, S. M. Adnan, and Z. Mehmood, "A Novel Optimized Semi-Blind Scheme for Color Image Watermarking," IEEE Access, vol. 8, pp. 169525-169547, 2020.
DOI
|
9 |
Q. Wei, H. Wang, and G. Zhang, "A Robust Image Watermarking Approach Using Cycle Variational Autoencoder," Secur. Commun. Netw., vol. 2020, 2020.
|
10 |
D. C. Wyld, J. Zizka, and D. Nagamalai, Eds., Advances in Computer Science, Engineering & Applications, vol. 166. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
|
11 |
H.-Y. Shum and M. Liao, Advances in Multimedia Information Processing-Pcm 2001: Second IEEE Pacific Rim Conference on Multimedia, Beijing, China, October 24-26, 2001, Proceedings, vol. 2. Springer Science & Business Media, 2001.
|
12 |
X. Kang, F. Zhao, G. Lin, and Y. Chen, "A novel hybrid of DCT and SVD in DWT domain for robust and invisible blind image watermarking with optimal embedding strength," Multimed. Tools Appl., vol. 77, no. 11, pp. 13197-13224, 2018.
DOI
|
13 |
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, "Reversible data hiding," IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, 2006.
DOI
|
14 |
M. Begum and M. S. Uddin, "Analysis of Digital Image Watermarking Techniques through Hybrid Methods," Adv. Multimed., vol. 2020, 2020.
|
15 |
W.-H. Chang and L.-W. Chang, "Semi-fragile watermarking for image authentication, localization, and recovery using Tchebichef moments," in 2010 10th International Symposium on Communications and Information Technologies, 2010, pp. 749-754.
|
16 |
S. Parusheva, "A comparative study on the application of biometric technologies for authentication in online banking," vol. 39, no. 4, p. 12, 2015.
|
17 |
P. Temdee and R. Prasad, Context-aware communication and computing: Applications for smart environment. Springer, 2018.
|
18 |
R. Jiang, S. Al-Maadeed, A. Bouridane, D. Crookes, and A. Beghdadi, Biometric Security and Privacy. Springer, 2017.
|
19 |
H.-T. Hu and L.-Y. Hsu, "Collective blind image watermarking in DWT-DCT domain with adaptive embedding strength governed by quality metrics," Multimed. Tools Appl., vol. 76, no. 5, pp. 6575-6594, 2017.
DOI
|
20 |
N. Nikolaidis and I. Pitas, "Robust image watermarking in the spatial domain," Signal Process., vol. 66, no. 3, pp. 385-403, 1998.
DOI
|
21 |
D. Singh and S. K. Singh, "DWT-SVD and DCT based robust and blind watermarking scheme for copyright protection," Multimed. Tools Appl., vol. 76, no. 11, pp. 13001-13024, 2017.
DOI
|
22 |
C. De Vleeschouwer, J.-F. Delaigle, and B. Macq, "Invisibility and application functionalities in perceptual watermarking an overview," Proc. IEEE, vol. 90, no. 1, pp. 64-77, 2002.
DOI
|
23 |
J. H. Abawajy, S. Mukherjea, S. M. Thampi, and A. Ruiz-Martinez, Security in Computing and Communications: Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings, vol. 536. Springer, 2015.
|
24 |
O. Hemida, Y. Huo, H. He, and F. Chen, "A restorable fragile watermarking scheme with superior localization for both natural and text images," Multimed. Tools Appl., vol. 78, no. 9, pp. 12373-12403, 2019.
DOI
|
25 |
H. Agarwal, B. Raman, and I. Venkat, "Blind reliable invisible watermarking method in wavelet domain for face image watermark," Multimed. Tools Appl., vol. 74, no. 17, pp. 6897-6935, 2015.
DOI
|
26 |
L. Rzouga Haddada and N. Essoukri Ben Amara, "Double watermarking-based biometric access control for radio frequency identification card," Int. J. RF Microw. Comput.-Aided Eng., vol. 29, no. 11, p. e21905, 2019.
|
27 |
A. Singh, M. Dave, and A. Mohan, "Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain," Wirel. Pers. Commun., vol. 83, no. 3, pp. 2133-2150, Aug. 2015, doi: 10.1007/s11277-015-2505-0.
DOI
|
28 |
X. Zhang, Q. Su, Z. Yuan, and D. Liu, "An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform," Optik, vol. 219, p. 165272, 2020.
DOI
|
29 |
"What is IMEI Number? - IMEI.info." https://www.imei.info/faq-what-is-IMEI/ (accessed Nov. 16, 2020).
|
30 |
"What is MEID? - IMEI.info." https://www.imei.info/faq-what-is-MEID/ (accessed Nov. 16, 2020).
|
31 |
J. Abraham and V. Paul, "An imperceptible spatial domain color image watermarking scheme," J. King Saud Univ.-Comput. Inf. Sci., vol. 31, no. 1, pp. 125-133, 2019.
DOI
|
32 |
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital watermarking and steganography. Morgan kaufmann, 2007.
|
33 |
M. Abdullatif, A. M. Zeki, J. Chebil, and T. S. Gunawan, "Properties of digital image watermarking," in 2013 IEEE 9th International Colloquium on Signal Processing and its Applications, Kuala Lumpur, Mar. 2013, pp. 235-240, doi: 10.1109/CSPA.2013.6530048.
DOI
|
34 |
M. Begum and M. S. Uddin, "Analysis of Digital Image Watermarking Techniques through Hybrid Methods," Adv. Multimed., vol. 2020, 2020.
|
35 |
R. Thanki, S. Borra, V. Dwivedi, and K. Borisagar, "An efficient medical image watermarking scheme based on FDCuT-DCT," Eng. Sci. Technol. Int. J., vol. 20, no. 4, pp. 1366-1379, 2017.
DOI
|
36 |
"SIPI Image Database." http://sipi.usc.edu/database/ (accessed Mar. 11, 2021).
|
37 |
Q. Su et al., "New rapid and robust color image watermarking technique in spatial domain," IEEE Access, vol. 7, pp. 30398-30409, 2019.
DOI
|
38 |
X. Zhang, Q. Su, Z. Yuan, and D. Liu, "An efficient blind color image watermarking algorithm in spatial domain combining discrete Fourier transform," Optik, vol. 219, p. 165272, 2020.
DOI
|
39 |
M. R. M. Isa, S. Aljareh, and Z. Yusoff, "A watermarking technique to improve the security level in face recognition systems," Multimed. Tools Appl., vol. 76, no. 22, pp. 23805-23833, 2017.
DOI
|
40 |
S. Ramakrishnan, Cryptographic and Information Security Approaches for Images and Videos. CRC Press, 2018.
|
41 |
X. Zhao and A. T. Ho, "An introduction to robust transform based image watermarking techniques," in Intelligent multimedia analysis for security applications, Springer, 2010, pp. 337-364.
|
42 |
P. Singh, B. Raman, and P. P. Roy, "A multimodal biometric watermarking system for digital images in redundant discrete wavelet transform," Multimed. Tools Appl., vol. 76, no. 3, pp. 3871-3897, 2017.
DOI
|
43 |
W. Huai-bin, Y. Hong-liang, W. Chun-dong, and W. Shao-ming, "A new watermarking algorithm based on DCT and DWT fusion," in 2010 International Conference on Electrical and Control Engineering, 2010, pp. 2614-2617.
|
44 |
L. Laur, M. Daneshmand, M. Agoyi, and G. Anbarjafari, "Robust grayscale watermarking technique based on face detection," in 2015 23nd Signal Processing and Communications Applications Conference (SIU), May 2015, pp. 471-475, doi: 10.1109/SIU.2015.7129861.
DOI
|