References
[1]. Sabarinathan, E, and Manoj, E., (2015). “FPGA
Implementation of Shearlet Transform Based Invisible
Image Watermarking Algorithm”. i-manager’s Journal on
Pattern Recognition, Vol. 2, No. 2, pp. 19-28.
[2]. Z. Shahid, M. Chaumont, and W. Puech, (2011). "Fast
protection of H.264/AVC by selective encryption of CAVLC
and CABAC for I and P frames". IEEE Trans. Circuits Syst.
Video Technol, Vol. 21, No. 5, pp. 565–576.
[3]. Tomaz, Andrej, (2012). “Block–wise authentication
method for digital images”. Journal of Electrical Engineering, Vol. 63, pp. 289–295, ISSN (Online), ISSN
(Print) 1335-3632, DOI: 10.2478/v10187-012-0042-6.
[4]. Giannoula, A, and Hatzinakos, (2003). “Compressive
data hiding for video signals”. ICIP 2003, International
Conference, ISSN: 1522-4880, PRINT ISBN: 0-7803-7750-8.
[5]. Hongmei Liu, and Jiwu Huang, (2005). “DWT based
video data hiding robust to MPEG”. Int. J. Image Grap, Vo.
05,No. 111, DOI:10.1142/S0219467825001689.
[6]. Dima Profrock, and Henryk Richter, (2005).
“H.264/AVC video authentication using skipped
macroblocks for an erasable watermark”. Proc. SPIE
5960,Visual Communication and Image Processing
2005, DOI:10.1117/12.632709
[7]. Changyong Xu, and Xijian Ping, (2006).
“Stegography in compressed video stream”. ICICI, Vol.1,
pp. 269-272
[8]. Lian, Liu,Ren, (2007). “Commutative encryption and
watermarking in video compression”. IEEE. Trans. Circuits
and Systems for Video Technology, Vol. 17, No. 6, pp.774-
778.
[9]. Shiguo Lian, and Zhongxuan Liu, (2007). “On the
performance of joint fingerprint embedding and
decryption scheme”. Computer Science Multimedia.
[10]. Arup Kumar Bhaumik, and Minkyu Choi, (2009).
“Data hiding in video”. SERSC, Vol. 2,No. 2.
[11]. Melih Pazarci, and Vadi Dipcin, (2012).“Data
embedding in technique for 8 bit color images”. DOI:
10.5120/13614-1384.
[12]. Paulpandi, and Meyyappan, (2012). “Hiding
messages using motion vector technique. In IJETT, Vol.
3,No. 3.
[13]. Manisha Yadav, and Mauli Joshi, (2013). “Improved
secure data transfer. IJARCSSE, Vol. 3.
[14]. Mahsa T. Pourazad, and Colin Doutre, (2012).
“HEVC: The new gold for video compression”. IEEE
Consumer Electronics Magazine.
[15]. Chae,J.J., and Manjunath, B.S. (1999). “Data Hiding
th in Video”. In Proc of 6 International Conference on
Image Processing ,Vol.1 pp.311-315.
[16].Zhang,J.,Li.J and Zhang. L. (2001). “ Video Watermark technique in motion vector”. Proc of XIV
Brazilian Symposium, IEEE, pp.179-182.
[17]. Fotopoulos, V and Skodras, A.N. (2003). “Digital
Image Watermarking. An overview”. EURASIP Newsletter,
Vol.14, No.4.
[18].Kapotas.S.K and Skodras, A.N. (2008). “A new data
hiding scheme for scene change detection in H.264
encoded video sequences”. IEEE International
Conference on Multimedia.
[19].Taehyun Kim,Kyungoh Park and Youpyo Hong,
(2012). “Video Watermarking Technique for H. 264 AVC”.
Optical Engineering, Vol. 51 No. 4.
[20].Arathi Chitla and Chandra M Mohan, (2012).
“Authentication of images through lossless Watermarking
(LWM) Technique with the aid of Elliptic curve
Cryptography (ECC)”. International Journal of computer
science Applications. Vol. 57, No. 6, pp. 17-25.