|
[1] M. Alghoniemy and A. H. Tewfik, “Geometric invariance in image watermarking,” IEEE Transactions on Image Processing, Vol. 13, No. 2, 2004, pp. 145-153. [2] M. Barni, F. Bartolinni and A. Piva, “Improved wavelet-based watermarking through pixel-wise masking,” IEEE Transactions on Image Processing, Vol. 10, No. 5, 2001, pp. 783-791. [3] P. Bas, J. M. Chassery and B. Macq, “ Geometrically invariant watermarking using feature points,” IEEE Transactions on Image Processing, Vol. 11, No. 9, 2002, pp. 1014-1028. [4] G. Bhatnagar and B. Raman, “A new robust reference watermarking scheme based on DWT-SVD,” Computer Standards and Interfaces, Vol. 31, No. 5, 2009, pp. 1002-1013. [5] C. C. Chang, P. Y. Tsai and M. H. Lin, “SVD-based digital image watermarking scheme,” Pattern Recognition Letters, Vol. 26, No. 10, 2005, pp. 1577-1586. [6] W. C. Chu, “DCT-based image watermarking using subsampling,” IEEE Transactions on Multimedia, Vol. 5, No. 1, 2003, pp. 34-38. [7] D. Delannay and B. Macq, “Generalized 2-D cyclic patterns for secret watermark generation,’’ IEEE International Conference on Image Processing, Vol. 2, 2000, pp. 77-79. [8] C. T. Hsu and J. L. Wu, “Hidden digital watermarks in images,” IEEE Transactions on Image Processing, Vol. 8, No. 1, 1999, pp. 58-68. [9] J. Kenndy and R. C. Eberhart, “Particle swarm optimization ,” IEEE Internation Conference on Neural Networks, Vol. 4, 1995, pp.1942-1948. [10] H. S. Kim, and H. K. Lee, “Invariant image watermark using Zernike moment ,” IEEE Transaction Circuits and System for Video Technology, Vol. 13, No. 8, 2003, pp. 766-775. [11] G. C. Langelaar and R. L. Lagendijk, “Optimal differential energy watermarking of DCT encoded images and video,” IEEE Transactions on Image Processing, Vol. 10, No. 1, 2001, pp. 148-158. [12] H. Y. Lee, H.S. Kim and H.K. Lee “Robust image watermarking using local invariant feature,” Optical Engineering, Vol. 45, No. 3, 2006, pp. 0370021-0370031. [13] L. D. Li and B. L. Guo, “Localized image watermarking in spatial domain resistant to geometric attacks,” International Journal of Electronics and Communications, Vol. 63, No. 2, 2009, pp. 123-131. [14] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller and Y. M. Lui, “Rotation, scale and translation resilient watermarking for images,” IEEE Transactions on Image Processing, Vol. 10, No. 5, 2001, pp. 767-782. [15] R. Liu and T. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Transactions on Multimedia, Vol. 4, No. 1, 2002, pp. 121-128. [16] A. A. Mohammad, A. Alhaj and S. Shaltaf, “An improved SVD-based watermarking scheme for protecting rightful ownership,” Signal Processing, Vol. 88, No. 9, 2008, pp. 2158-2180. [17] B. C. Mohan and S. S. Kumar, “A robust image watermarking scheme using singular value decomposition,” Journal of Multimedia, Vol. 3, No. 1, 2008, pp.7-15. [18] J. O''Ruanaidh and T. Pun, “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Signal Processing, Vol. 66, No. 3, 1998, pp. 303-317. [19] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, “Information hiding – a survey,” Proceedings of the IEEE, Vol. 87, No. 7,1999, pp. 1062-1078. [20] A. A. Reddy and B. N. Chatterji, “Hidden digital watermarks in images,” Pattern Recognition Letters, Vol. 26, No. 7, 2005, pp. 1019-1027. [21] Shi. Y. and R. C. Eberhart, “A modified particle swarm optimizer,” IEEE International Conference on Evolutionary Programming, 1998, pp. 69-73. [22] C.W. Tang and H. M. Hang, “A feature-based robust digital image watermarking scheme,” IEEE Transactions Signal Processing, Vol. 11, No. 9, 2003, pp. 950-959. [23] S. H. Wang and Y. P. Lin, “Wavelet tree quantization for copy protection watermarking,” IEEE Transactions on Image Processing, Vol. 13, No. 2, 2004, pp. 154-165. [24] X. Y. Wang, L. M. Hou and Y. P. Lin, “A feature-based robust digital image watermarking against geometric attacks,” Image and Vision Computing, Vol. 26, No. 7, 2008, pp. 980-989.
|