References
[1]. Roslinenesakumari, G., Sumalatha, Table 2. Device Utilization Summary L., Vijayakumar L. (2012). “Fuzzy Based Chaotic and Logistic Method for
Digital Watermarking Systems”, International Journal of
Scientific and Engineering Research, Vol. 3, No. 6.
[2]. Sridevi, T., Sameena Fatima, S. (2013). “Digital Image
Watermarking using Fuzzy Logic approach based on DWT
and SVD ”, International Journal of Computer
Applications, Vol.74, No.13.
[3]. Nanda yalamali, ManjunathAsuti. (2012). “An
Adaptive image watermarking algorithm based on
Neural networks”, International Journal of Scientific and
Engineering Research, Vol. 3, No. 7.
[4]. Anumol, T., Binson, V., Soumya, R. (2013). “FPGA
Implementation of Low Power, High Speed and Area
Efficient Invisible Image Watermarking Algorithm for
Images”, International Journal of Scientific and
Engineering Research, Vol. 4, No. 8.
[5]. Karthigaikumar, Anumol, Baskaran. (2011). “FPGA
Implementation of High Speed Low Area DWT Based
Invisible Image Watermarking Algorithm", International
Journal of System Architecture, Vol. 57, No. 4, pp. 404-
411.
[6]. Sameh Oueslati, AdneneCherif, Bassel Solaiman.
(2011). “Adaptive Image Watermarking Scheme Based
On Neural Network”, International Journal of Engineering
Science and Technology, Vol. 3, No. 1.
[7]. BibiIsac, Santhi (2011). “A Study on Digital Image and
Video Watermarking Schemes using Neural Networks”,
International Journal of Computer Applications, Vol. 12,
No. 9.
[8]. Nallagarla, Varadarajan (2009). “Robust Digital
watermarking scheme with neural network and fuzzy logic
approach”, International Journal of Emerging
Technology and Advanced Engineering, Vol. 2, No. 9.
[9]. Arathi, C., Chandra, M. (2012). “Authentication of
images through lossless watermarking technique with the
aid of Elliptic Curve Cryptography (ECC)”, International
Journal of Computer Applications, Vol. 57, No. 6, pp. 17-
25.
[10]. Baisa, G (2011). “Wavelet based colour image
watermarking scheme giving high robustness and exact
correlation”, International Journal of Emerging Trends in Engineering and Technology, Vol. 1, No. 1, pp. 23-30.
[11]. Devapriya, M., Ramar, K. (2010). “Statistical Image
Watermarking In DWT with Capacity Improvement”,
Global Journal of Computer Science and Technology,
Vol. 10, No.2, pp. 20-24.
[12]. Dinu, C (2012). “Improved embedding for
prediction-based reversible watermarking”, IEEE
Transactions on Information Forensics and security, Vol. 6,
No. 3, pp. 873-882.
[13]. Sandeep, K., Rajiv, B (2013). “Enhanced Technique
for Watermarking Using MFHWT”, International Journal of
Advanced Research in Computer Science and Software
Engineering, Vol. 3, No.5, pp. 1199-1202.
[14]. Umaamaheshvari, A., Thanushkodi, K. (2012). “A
novel watermarking technique based on visual
cryptography ”, International Journal of Advanced
Research In Computer Engineering and Technology, Vol.
1, No. 7, pp. 70-74.
[15]. Yang, C., Tsai, M. (2010). “Improving histogrambased
reversible data hiding by interleaving predictions”,
IET Image Process, Vol. 4, No. 4, pp. 223–234.
[16]. Bo, O., Rongrong, N., Gang, C. (2010). “A high
payload histogram-based reversible watermarking using
linear prediction”, Sixth International Conference on
Intelligent Information Hiding and Multimedia Signal
Processing, pp.446-449.
[17]. Sujatha, S., Mohamed, S. (2010). “Feature Based
Watermarking Algorithm by Adopting Arnold Transform”,
Proceedings of Springer International Conference on
Information and Communication Technologies ICT,
pp.78-82.
[18]. Jih, P., Che, W., Wei, J., Hung, H. (2010).
“Watermarking technique based on DWT associated with
embedding rule”, International Journal of Circuits,
Systems and Signal Processing, Vol. 4, No.2, pp. 72-82.
[19]. Pan, W., Coatrieux, G., Cuppens, N., Cuppens, F.,
Roux, C. “An Additive and Lossless Watermarking Method
Based on Invariant Image Approximation and Haar
n d Wavelet Transform”, 32 Annual International
Conference of the IEEE EMBS, Buenos Aires, pp. 4740- 4743.
[20]. A Mohamed Zuhair, A Mohamed Yousef. (2010).
“FPGA based image security authentication in digital
camera using invisible watermarking technique”,
International Journal of Engineering Science and
Technology, Vol.2, No.6, pp.1745-1751.