[1]
Bami, M., et al. Watermark embedding: hiding a signal within a cover image. Communications Magazine, IEEE, 2001. 39(8): pp.102-108.
DOI: 10.1109/35.940048
Google Scholar
[2]
Jian Liu and Xiangjian He. A Review Study on Digital Watermarking. In proceedings of IEEE , 2005, 337-341.
Google Scholar
[3]
Younho Lee, Heeyoul Kim, Yongsu Park. A new data hiding scheme for binary image authentication with small image distortion. Information Sciences, 2009, 179(12): 3866-3884.
DOI: 10.1016/j.ins.2009.07.014
Google Scholar
[4]
H. Guo, Y. Li, S. Jajodia. Chaining watermarks for detecting malicious modifications to streaming data, Information Sciences 2007, 177(1): 81-298.
DOI: 10.1016/j.ins.2006.03.014
Google Scholar
[5]
Solanki, K., Sakar, A., Manjunath, B.S. YASS: Yet another steganographic scheme that resists blind steganalysis. In: Furon, T., Cayre, F., Doerr, G., Bas, P. (eds. ) IH 2007. LNCS, vol. 4567, Springer, Heidelberg, 2008, 16-31.
DOI: 10.1007/978-3-540-77370-2_2
Google Scholar
[6]
Ganic, E., Dexter, S.D., Eskicioglu, A. M. Embedding Multiple Watermarks in the DFT Domain Using Low and High Frequency Bands. IS&T/SPIE's 17th Annual Symposiun on Electronic Imaging, Security, Steganography, and Watermarking of Multitnedia Contents VII Conference, San Jose, CA, January 17-20, (2005).
DOI: 10.1117/12.594697
Google Scholar
[7]
J. L. Liu, D. C. Lou, M. C. Chang, H. K. Tso. A robust watermarking scheme using self-reference image, Comput. Stand. Interfaces, 2006, 28(3): 356-367.
DOI: 10.1016/j.csi.2005.07.001
Google Scholar
[8]
W. Y. Chen, C. H. Chen. A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection, Pattern Recognition, 2005, 38(4): 587–598.
DOI: 10.1016/j.patcog.2004.10.001
Google Scholar
[9]
X. Y. Luo, F. L. Liu, S. Liu, C. F. Yang. Steganalysis and watermarking detection patent - State of the art. Recent Patent on Engineering, 3(1): 60-64 (2009).
Google Scholar
[10]
C. F. Yang, F. L. Liu, X. Y. Luo, X. Ge. Inversigation of Typical Digital Steganography Methods. Recent Patent on Engineering, 4(2): 86-91 (2010).
Google Scholar
[11]
Braudaway Gordon Wesley, Mintzer Frederick Cole. Protecting images with an image watermark: United States Patent 5825892 (1998).
Google Scholar
[12]
Cox Ingemar J., Miller Matthew L., Oami Ryoma. Robust digital watermarking: United States Patent 6154571 (2000), 6278792 (2001), 6724911(2004), 6738493(2004).
Google Scholar
[13]
Cooklev Todor. Method and apparatus for wavelet-based digital watermarking: United States Patent 6359998 (2002).
Google Scholar
[14]
Tian Jun, Decker Stephen K. Wavelet based feature modulation watermarks and related applications: United States Patent 6714683 (2004).
Google Scholar
[15]
Fridrich Jessica, Goljan Miroslav, Du; Rui. Lossless embedding of data in digital objects: United States Patent 7006656 (2006).
Google Scholar
[16]
Tian; Jun, Stach; John, Lofgren; Neil E. Image processing methods using reversible watermarking: United States Patent 7187780 (2007).
Google Scholar
[17]
Rhoads Geoffrey, Gustafson Ammon. Multiple watermarking techniques for documents and other data: United States Patent 6332031 (2001).
Google Scholar
[18]
Rhoads; Geoffrey B., Gustafson; Ammon E. Equipment employing watermark-based authentication function: United States Patent 6804376 (2004), 6850626(2005).
Google Scholar