[1]
Ye, Tianyu. A watermarking algorithm for certificate forgery prevention, Consumer Electronics, Communications and Networks (CECNet), 2011 International Conference on. 2011. pp.3888-3890.
DOI: 10.1109/cecnet.2011.5768207
Google Scholar
[2]
Fu, Ming Sun and Oscar C. Au. Watermarking technique for color halftone images, IEEE ICASSP 2004. 2004. pp.381-384.
DOI: 10.1109/icassp.2004.1326561
Google Scholar
[3]
Lien, Brian K. and Chao-Yi Chang. Watermarking of ordered dither halftone images by bit interleaving, 8th IEEE International Conference on Computer and Information Technology. 2008, Sydney, NSW: IEEE. pp.384-389.
DOI: 10.1109/cit.2008.4594706
Google Scholar
[4]
Xu, Hongping and Xiaoxia Wan, Watermarking algorithm for print-scan based on HVS and multiscale error diffusion, in 2008 International conference on computer science and software engineering2008: Wuhan, China. pp.245-248.
DOI: 10.1109/csse.2008.783
Google Scholar
[5]
Kim, Hyung-Shin, et al. Watermark using radon transform and bispectrum invariants, 5th International workshop on Information hiding. 2003, Noordwijkerhout, Netherlands. pp.145-159.
DOI: 10.1007/3-540-36415-3_10
Google Scholar
[6]
Lin, C., et al., Rotation, scale and translation resilient watermarking for images. IEEE Trans, Image Processing, 2001, vol. 10(5): pp.767-782.
DOI: 10.1109/83.918569
Google Scholar
[7]
Joseph, J.K., O Ruanaidh, and Thierry Pun, Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal processing, 1998, vol. 66: pp.303-317.
DOI: 10.1016/s0165-1684(98)00012-7
Google Scholar
[8]
Mohamed, Faraoun Kamel and Rabhi Abbes, RST robust watermarking scheme based on image normalization and DCT decomposition. Malaysian Journal of Computer Science, 2007, vol. 20(1): pp.77-90.
DOI: 10.22452/mjcs.vol20no1.7
Google Scholar
[9]
Huang, Jiwu and Yun-Q. Shi, Reliable information bit hiding. IEEE transaction on circuits and systems for video technology, 2002, vol. 12(10): pp.916-920.
DOI: 10.1109/tcsvt.2002.804897
Google Scholar