References
[1]. Makbol, N. M., Khoo, B. E., & Rassem, T. H. (2016). Blockbased
discrete wavelet transform-singular value
decomposition image watermarking scheme using
human visual system characteristics. IET Image Processing,
10(1), 34-52.https://doi.org/10.1049/iet-ipr.2014.0965
[2]. Sharma, S., & Kumar, V. (2016). A survey of blind & nonblind
watermarking techniques. International Journal of
Scientific & Engineering Research, 7(12), 1218-1223.
[3]. Rajput, U., & Tiwari, N. (2015, April). A novel technique
for RGB invisible watermarking based on 2-DWT-DCT
algorithm. In 2015 Global Conference on Communication
Technologies (GCCT) (pp. 386-390). IEEE.
[4]. Gupta, V., & Barve, M. A. (2014). A review on image
watermarking and its technique. International Journal of
Mechanical Engineering and Information Technology,
2(01), 73-81.
[5]. Shoaib, S., & Mahajan, R. C. (2015, January).
Authenticating using secret key in digital video
watermarking using 3-level DWT. In 2015 International
Conference on Communication, Information & Computing
Technology (ICCICT), (pp. 1-5). IEEE.
[6]. Kamesh, S., Devi, K. D., & Raviteja, S. N. V. P. (2017). DWT
based data hiding using video steganography.
International Journal of Engineering Sciences & Research
Technology, 6(4), 361-367.
[7]. Shete, S.A., Chavan, V. D., & Tivarekar, R. P. (2019). Multiwavelet
transform-video encoding for content protection
with secret key. Journal of Emerging Technologies and Innovative Research (JETIR), 6(5), 104-108.
[8]. Alilou, V.K. (2020). Finger Print Matching: A simple
approach. GitHub. Retrieved from https://github.com/alil
ou63/fingerprint
[9]. Jothibai, P.N. (2017). Optimized blind image
watermarking method based on firefly algorithm in wavelet
packet transform (WPT) domain. International Journal of
Engineering Research in Electronics and Communication
Engineering, 4(12), 53-58.
[10]. Moler, C. (2016). Householder Reflections and the QR
Decomposition [Blog]. Cleve's Corner: Cleve Moler on Mathematics and Computing. Retrieved from https://bl
ogs.mathworks.com/cleve/2016/10/03/householderreflections-
and-the-qr-decomposition/
[11]. Kaur, M., & Attri, V. K. (2015). A survey on digital image
watermarking and its techniques. International Journal of
Signal Processing, Image Processing and Pattern
Recognition, 8(5), 145-150.
[12]. Kowsalya, & Subanandhini. (2016). Performance
analysis and design of an efficient biometric system by
using watermarking with 3DWT. International Journal of
Computer Science and Mobile Computing, 5(4), 92-99.