References
[1]. Liu, R. and Tan, (2002). “An SVD-Based Watermarking
Scheme for Protecting Rightful Ownership”, IEEE
Transactions on Multimedia, Vol. 4, No. 1, pp.121-128.
[2]. K.Anusudha, A. Sangeetha and S. Ayeswarya
(2007). “A Robust Digital watermarking of Satellite Image
at Third Level DWT Decomposition”, International
Conference on Computational Intelligence and
Multimedia Application.
[3]. Dr.Azizah A.Manaf, Akram M.Zeki (2006).
“Watermarking of Digital Images”, University Technology
Malaysia / ATMA, 1stENGAGE European Union - Southeast
Asia ICT, Research Collaboration Conference, March 29-
31.
[4]. J. Cox, M. L. Miller, and A. McKellips, (1999).
“Watermarking as communicat ions wi th s ide
information,” Proc. IEEE, Vol.87, pp.1127-1141, July.
[5]. Ho, A.T.S. Et.al (1999).“Digital steganography for
information security”, Internet Business 99, Communic
Asia 99, pp.22-25 June.
[6]. D.J Fleet and D.J Heeger, (1997). “Embedding
invisible information in color images,” Proc. IEEE
international conf. on image Processing, ICIP-97, Vol 1,
pp.532-535.
[7]. Yiwei Wang, John F. Doherty, and Robert E. Van
Dyck, (2002). “A Wavelet-Based Watermarking Algorithm
for Ownership Verification of Digital Images”, IEEE
Transactions on Image Processing, Vol. 11, No. 2, pp. 77-
88, February.
[8]. Košice Park Komenskeho 13, 041 20 Kosice Slovak
(2001). Republic “Dig ital watermarking in wavelet
transform domain”, Radio engineering, Vol. 10, No. 2,
July.
[9]. Quan, L. and Qingsong, A (2004). “A Combination of
DCT-Based and SVD-Based Watermarking Scheme” Proceedings of 7 International Conference on Signal
Processing (ICSP04), Vol. 1, pp.873-876.
[10]. Hsieh, M., D. Tseng, and Y. Huang, (2001). “Hiding
Digital Watermarks Using Multi resolution Wavelet
Transform, '' IEEE Trans. on Industrial Electronics, 48(5): pp.875-882.
[11]. Reddy, A. and B. Chatterji, (2005). “A New Wavelet
Based Logo-watermarking Scheme,'' Pattern Recognition
Letters, 26(7): pp. 1019-1027, 2005.