[1]
L. Chang-Hsing and L. Yeuan-Kuen, An adaptive digital image watermarking technique for copyright protection, Consumer Electronics, IEEE Transactions on, vol. 45, pp.1005-1015, (1999).
DOI: 10.1109/30.809176
Google Scholar
[2]
Katzenbeisser, S., Petitcolas, F.A.P., Information hiding techniques for steganography and digital watermarking, Artech House Publishers, (2000).
Google Scholar
[3]
R. Oppliger, Security Technologies for the World Wide Web, in Intellectual Property Protection, 2nd ed Noewood, MA: Artech House, 2003, pp.347-357.
Google Scholar
[4]
Shoemaker, C., Hidden bits: A survey of techniques for digital watermarking, Independent study, EER 290, spring (2002).
Google Scholar
[5]
M. Swanson, B. Zhu and A. Tewfik, Transparent robust image watermarking, Proceedings of International Conference on Image Processing, 1996, Vol. 3, pp.211-214, (1996).
DOI: 10.1109/icip.1996.560421
Google Scholar
[6]
M. Swanson, B. Zhu, B. Chau and A. Tewfik, Object-Based Transparent Video Watermarking, Proceedings of IEEE Signal Processing Society 1997 Workshop on Multimedia Signal Processing, Princeton, New Jersey, USA, Jun. 23-25, (1997).
DOI: 10.1109/mmsp.1997.602663
Google Scholar
[7]
T. Furon, P. Duhamel, Robustness of asymmetric watermarking technique, Proceedings of International Conference on Image Processing 2000, Vol. 3, pp.21-24, (2000).
DOI: 10.1109/icip.2000.899271
Google Scholar
[8]
R. Lancini, F. Mapelli and S. Tubaro, A robust video watermarking technique in the spatial domain, Processing and Multimedia Communications, 4th EURASIP-IEEE Region 8 International Symposium on Video/Image VIProm- Com, pp.251-256, (2002).
DOI: 10.1109/viprom.2002.1026664
Google Scholar
[9]
Researches on Uniform Meaningful Watermark, Liu Quan, Jiang Xuemei, Proceedings of the 2002 6t International Conference on Signal Processing, (2002).
DOI: 10.1109/icosp.2002.1181003
Google Scholar
[10]
C. Coconu,V. Stoica,F. Ionescu,D. Profeta. Distributed implementation of discrete cosine transform algorithm on a networkofworkstations. InP r o ceedi n gs of the Inter nati onal Wor k s h op Tr ends & R ecent A ch i evem ents i n Inf or m ati on Technol ogy , Romania, p.116–121, (2002).
Google Scholar
[11]
Qi, Xiaojun and Qi, Ji., A robust content-based digital image water marking scheme., s. l. : Signal Processing, 2007, Vol. 87.
DOI: 10.1016/j.sigpro.2006.11.002
Google Scholar
[12]
M.S. Hsieh, and D.C. Tseng , Hiding digital watermarks using multi-resolution wavelet transform, IEEE Transactions on industrial electronics, vol. 48, No. 5, p.875882, Oct, (2001).
DOI: 10.1109/41.954550
Google Scholar
[13]
Agrestea, Santa, Andalorob, Guido and Prestipin, Daniela., An image adaptive, wavelet-based watermarking of digital images., s. l. : Journal of Computational and Applied Mathematics, (2006).
Google Scholar
[14]
Guan Jinyu; Mei Rui; Zhang Wenying; , Research of digital watermarking based on wavelet transform, Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference on , vol. 4, no., pp.23-27, 26-28 Feb. (2010).
DOI: 10.1109/iccae.2010.5451798
Google Scholar
[15]
Jianmin Xie; Qin Qin; , Study of image digital watermarking algorithm and robustness based on the wavelet transform techniques, Information Management and Engineering (ICIME), 2010 The 2nd IEEE International Conference on , vol., no., pp.529-532, 16-18 April (2010).
DOI: 10.1109/icime.2010.5478135
Google Scholar
[16]
L. Liu. A Survey on Digital Watermarking Technologies, Technical Report, Stony Brook University, New York, USA, (2005).
Google Scholar
[17]
Hua Lian; Bo-Ning Hu; Rui-Mei Zhao; Yan-Li Hou; , Design of digital watermarking algorithm based on wavelet transform, Machine Learning and Cybernetics (ICMLC), 2010 International Conference on , vol. 5, no., pp.2228-2231, 11-14 July (2010).
DOI: 10.1109/icmlc.2010.5580639
Google Scholar
[18]
J. Puate and F. Jordan, Using fractal compression scheme to embed a digital signature into image, in Proc. SPIE Photonics East Symp., Boston, MA, Nov. 18–22, (1996).
Google Scholar
[19]
Aidan Mooney, John G. Keating, Ioannis Pitas, A comparative study of chaotic and white soise signals in digital watennarking, Chaos, Solition and Fractal 35, pp.913-921, (2008).
DOI: 10.1016/j.chaos.2006.05.073
Google Scholar
[20]
Abdelwahab, A.A.; Elmogazy, H.A.; , Wavelet-Based Adaptive Embedded Fractal Image Coding, Computer Engineering and Systems, The 2006 International Conference on , vol., no., pp.202-207, 5-7 Nov. (2006).
DOI: 10.1109/icces.2006.320448
Google Scholar
[21]
]ShuGuo Yang; ChunXiaLi; ShengHeSun; RongSheng Xie; , A Fractal Watermarking Scheme for Image in DWT Domain, Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on , vol. 1, no., pp.364-368, July 30 2007-Aug. 1 (2007).
DOI: 10.1109/snpd.2007.273
Google Scholar
[22]
Xiaoqing Huang; Shenglin Yu; Wei Zhang; , A novel method for embedding gray image watermarking into orthogonal fractal compression image, Communications, Circuits and Systems, 2009. ICCCAS 2009. International Conference on , vol., no., pp.485-488, 23-25 July (2009).
DOI: 10.1109/icccas.2009.5250485
Google Scholar
[23]
Chen Yongqiang; Peng Lisen; Hu Hanping; , Gray Image Watermark Method Based on Fractal Compression, Intelligent Computation Technology and Automation (ICICTA), 2010 International Conference on , vol. 2, no., pp.403-406, 11-12 May (2010).
DOI: 10.1109/icicta.2010.261
Google Scholar
[24]
J-M. Chassery P. Bas and B. Macq. Robust watermarking based on the warping of pre-defined triangular patterns. In Proc. SPIE, pages 99–109, (2000).
DOI: 10.1117/12.385013
Google Scholar
[25]
J. -M. Chassery P. Bas and F. Davoine. A geometrical and frequential watermarking scheme using similarities. SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, 3657: 264–272, (1999).
DOI: 10.1117/12.344675
Google Scholar
[26]
P. Davern and M. Scott. Fractal based image steganography. Information Hiding, First International Workshop, Lecture Notes in C omputer Science, pages 279–294, (1996).
DOI: 10.1007/3-540-61996-8_47
Google Scholar
[27]
Li Guanhua; Zhao Yao; Yuan Baozong; , Using the fractal code to watermark images, Signal Processing, 2002 6th International Conference on , vol. 1, no., pp.829-832 vol. 1, 26-30 Aug. (2002).
DOI: 10.1109/icosp.2002.1181184
Google Scholar
[28]
J-M. Chassery P. Bas and F. Davoine. Self-similarity based image watermarking. IX European Signal Processing Conference, Island of Rhodes, Greece, pages 8–11, (1998).
Google Scholar
[29]
A. E. Jacquin. Image coding based on a fractal theory of iterated contractive image transformation. IEEE Transactions on Image Processing, 1(1): 18-30, January (1992).
DOI: 10.1109/83.128028
Google Scholar
[30]
Davis, G. and Nosralinia, A., Wavelet-Based Image Coding: An Overview, IEEE Trans. on Image Proc., March (1996).
Google Scholar
[31]
Gulati Kamal, Information Hiding Using Fractal Encoding, Indian Institude of Technology Bombay, Jan. (2003).
Google Scholar
[32]
Henry Beker and Fred Piper, Cipher Systems: The Protection of Communications, Northwood Publications, (1982).
Google Scholar
[33]
Wei-Hung Lin; Shi-Jinn Horng; Tzong-Wann Kao; Pingzhi Fan; Cheng-Ling Lee; Yi Pan; , An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization, Multimedia, IEEE Transactions on , vol. 10, no. 5, pp.746-757, Aug. (2008).
DOI: 10.1109/tmm.2008.922795
Google Scholar