References
[1]. Anfinogenov, S., Korzhik, V. I., & Morales-Luna, G.
(2012). A multiple robust digital watermarking system for still
images. International Journal of Computer Science and
Applications, 9(3), 37-46.
[2]. Hernandez, J. R., Amado, M., & Perez-Gonzalez, F.
(2000). DCT-domain watermarking techniques for still
images: Detector performance analysis and a new
structure. IEEE Transactions on Image Processing, 9(1), 55-
68. https://doi.org/10.1109/83.817598
[3]. Jaiswal, R. J., & Patil, N. N. (2012). Multiple
watermarking for text documents: A review. World Journal
of Science and Technology, 2(3), 176-179.
[4]. Langelaar, G. C., & Lagendijk, R. L. (2001). Optimal
differential energy watermarking of DCT encoded images
and video. IEEE Transactions on Image Processing, 10(1),
148-158. https://doi.org/10.1109/83.892451
[5]. Li, D., Mersereau, R. M., & Simske, S. (2005,
September). Blur identification based on Kurtosis
minimization. In IEEE International Conference on Image
Processing 2005 (Vol. 1, pp. 905-908). IEEE. https://doi.
org/10.1109/ICIP.2005.1529 898
[6]. Li, Y., & Wang, X. (2009, May). A novel multiple
watermarking algorithm based on bandelet transform. In
2009, WRI Global Congress on Intelligent Systems (Vol. 4,
pp. 238-242). IEEE. https://doi.org/10.1109/GCIS.2009.354
[7]. Lin, C. Y., Wu, M., Bloom, J. A., Cox, I. J., Miller, M. L., &
Lui, Y. M. (2001). Rotation, scale, and translation resilient
watermarking for images. IEEE Transactions on image
processing, 10(5), 767-782. https://doi.org/10.1109/83.91
8569
[8]. Mascher-Kampfer, A., Stögner, H., & Uhl, A. (2006).
Multiple re-watermarking scenarios. In Proceedings of the
13th International Conference on Systems, Signals, and
Image Processing (IWSSIP 2006) (pp. 53-56). Budapest,
Hungary.
[9]. Nasir, I., Weng, Y., & Jiang, J. (2008, April). Novel
multiple spatial watermarking technique in color images. In
Fifth International Conference on Information Technology:
New Generations (ITNG 2008) (pp. 777-782). IEEE. https://
doi.org/10.1109/ITNG.2008.66
[10]. Piva, A., Bartolini, F., & Barni, M. (2002). Managing
copyright in open networks. IEEE Internet Computing, 6(3),
18-26. https://doi.org/10.1109/MIC.2002.1003126
[11]. Rai, V., Rai, J., & Rana, M. (2011). Effective Multiple
Image watermarking based on dither quantization. In
Proceedings of the 5th National Conference (INDIACom)
Computing for Nation Development.
[12]. Sheppard, N. P., Shafavi-Naini, R., & Ogunbona, P.
(2001). On multiple watermarking. In Proceedings of the
2001 workshop on Multimedia and security: new challenges
(MM & Sec '01), (pp. 3-6). Newyork, USA: Association for
Computing Machinery Press. https://doi.org/10.1145/1232
454.1232458
[13]. Solachidis, V., & Pitas, I. (2001). Circularly symmetric
watermark embedding in 2-D DFT domain. IEEE
Transactions on Image Processing. 10(11), 1741–1753.
https://doi.org/10.1109/83.967401
[14]. Surekha, B., Swamy, G., & Rao, K. S. (2010). A multiple
watermarking technique for images based on visual
cryptography. International Journal of Computer
Applications, 1(11), 66-71.
[15]. Wheeler, G. E., Sheppard, N. P., & Safavi-Naini, R.
(2004). Weighted segmented digital watermarking, In Third
International Workshop on Digital Watermarking (IWDW
2004) (pp. 89-100). Heidelberg, Berlin: Springer-Verlag. https://doi.org/10.1007/978-3-540-31805-7_8
[16]. Wong, P. W., & Memon, N. (2001). Secret and public
key image watermarking schemes for image authentication
and ownership verification. IEEE Transactions on Image
Processing, 10(10), 1593-1601. https://doi.org/10.1109/
83.951543
[17]. Yang, C. N. & Chung, T. H. (2010). A general multi-secret visual cryptography scheme. Optics Communications,
283(24), 4949-4962.
[18]. Zhang, Y., Chen, T., & Li, J. (2001, August). Embedding
watermarks into both DC and AC components of DCT. In
Security and Watermarking of Multimedia Contents III (Vol.
4314, pp. 424-435). https://doi.org/10.1117/12.435426