References
[1]. Tiwari, A., & Sharma, M. (2012). A Survey of Transform
Domain based Semifragile Watermarking Schemes for
Image Authentication. Journal of the Institution of
Engineers (India): Series B, Vol. 93, No. 3, pp.185-191.
[2]. Cox, I. J., & Miller, M. L. (2002). “The first 50 years of
electronic watermarking”. EURASIP Journal on Applied
Signal Processing, Vol. 1, pp.126-132.
[3]. Naci, U.,& Akcay, M. (2004). “Comparative
evaluation of semifragile watermarking algorithms”.
Journal of Electronic Imaging, Vol. 13, No. 1, pp. 209-219.
[4]. Lin, E. T., Podilchuk, C. I., & Delp III, E. J. (2000).
“Detection of image alterations using semifragile
watermarks”. In Electronic Imaging, International Society
for Optics and Photonics, pp. 152-163
[5]. Piper, A., & Safavi-Naini, R. (2013). “Scalable fragile
watermarking for image authentication”. Information
Security, IET, Vol. 7, No. 4, pp. 300-311.
[6]. Lin, C. Y., & Chang, S. F. (2000). “Semifragile
watermarking for authenticating JPEG visual content”. In
Electronic Imaging, International Society for Optics and
Photonics, pp. 140-151.
[7]. Maeno, K., Sun, Q., Chang, S. F., & Suto, M. (2006).
“New semi-fragile image authentication watermarking techniques using random bias and nonuniform
quantization”. IEEE Transactions on Multimedia, Vol. 8,
No.1, pp.32-45.
[8]. Chen, T. S., & Chang, C. C. (1997). “A new image
coding algorithm using variable-rate side-match finitestate
vector quantization”. IEEE Transactions on Image
Processing, Vol. 6, No. 8, pp. 1185-1187.
[9]. Ning, C. H. E. N., & J ie, Z. H. U. (2007). “Multipurpose
speech watermarking based on multistage vector
quantization of linear prediction coefficients”. The Journal
of China Universities of Posts and Telecommunications,
Vol. 14, No. 4, pp. 64-69.
[10]. Faúndez-Zanuy, M. (2001). “A combination between
VQ and covariance matrices for speaker
recognition(ICASSP '01). 2001 IEEE International
Conference on Acoustics, Speech, and Signal
Processing, Vol. 1, pp. 453-456.
[11]. Sayood, K. (2012). Introduction to data
compression.Newnes.
[12]. Gersho, A., & Gray, R. M. (2012). “Vector quantization
and signal compression”. Springer Science & Business
Media, Vol.159.
[13]. Lu, Z. M., & Sun, S. H. (2000). “Digital image
watermarking technique based on vector quantization'.
Electronics Letters, Vol. 36, No. 4, pp. 303-305.
[14]. Makur, A., & Selvi, S. S. (2001). “Variable dimension
vector quantization based image watermarking”. Signal
Processing, Vol. 81, No. 4, pp. 889-893.
[15]. Huang, H. C., Feng-Hsing, W. A. N. G., & Jeng-
Shyang, P. A. N. (2002). “A VQ-based robust multiwatermarking
algorithm”.IEICE TRANSACTIONS on
Fundamentals of Electronics, Communications and
Computer Sciences, Vol. 85, No. 7, pp.1719-1726.
[16]. Lu, Z. M., Liu, C. H., Xu, D. G., & Sun, S. H. (2003).
“Semi-fragile image watermarking method based on
index constrained vector quantization”. Electronics
Letters, Vol. 39, No. 1, pp. 35-36.
[17]. Wu, H. C., & Chang, C. C. (2005). “A novel digital
image watermarking scheme based on the vector
quantization technique”. Computers & Security, Vol. 24, No. 6, pp. 460-471.
[18]. Lu, Z. M., Xu, D. G., & Sun, S. H. (2005). “Multipurpose
image watermarking algorithm based on multistage
vector quantization”. IEEE Transactions on Image
Processing, Vol. 14, No. 6, pp. 822-831.
[19]. Linde, Y., Buzo, A., & Gray, R. M. (1980). “An algorithm
for vector quantizer design”. IEEE Transactions on
Communications, Vol. 28, No.1, pp. 84-95.
[20]. Barreto, P. S., Kim, H. Y., & Rijmen, V. (2002). “Toward
secure public-key blockwise fragile authentication
watermarking”. IEEEProceedings-Vision, Image and
Signal Processing, Vol.149, No. 2, pp. 57-62.