References
[1]. Sabarinathan, E., Manoj, E., (2015). “FPGA
Implementation of Shearlet Transform Based Invisible
Image Watermarking Algorithm”. In: i-manager’s Journal
on Pattern Recognition, Vol.2, No. 2, pp.19-28.
[2]. Zhang, J., Li, J., Zhang, L., (2001). “Video watermark
technique in motion vector”. In: Proceedings of XIV
Symposium on Computer Graphics and Image
Processing, pp. 179-182.
[3]. Fotopoulos, V., Skodras, A. N., (2003). “Transform
domain watermarking: Adaptive selection of the
watermarks position and length”. In: Proceedings of Visual
Communications and Image Processing, VCIP 2003.
[4]. Kapotas, S.K., Varsaki, E.E., Skodras, A.N., (2007).
“Data hiding in H.264 encoded video sequences”. In: IEEE
International Workshop on Multimedia Signal Processing
(MMSP), Chania, Greece, October 13.
[5]. I. K. Kim, J. Min, T. Lee, W. J. Han, J. H. Park, (2012).
"Block partitioning structure in the HEVC standard”. IEEE
Trans. on Circuits and Syst. for Video Technol., Vol. 22, No.
12, pp. 1697-1706.
[6]. Anumol, T., J., Binson, V., A.,Soumya, R., (2013). “FPGA
Implementation of Low Power, High Speed, Area Efficient
Invisible Image Watermarking Algorithm for Images”. In:
International Journal of Scientific and Engineering
Research, Vol. 4, No. 8.
[7]. Arathi, C., Chandra, M., (2012). “Authentication of Images Through Lossless Watermarking Technique with the
Aid of Elliptic Curve Cryptography (ECC)”. In: International
Journal of computer applications, Vol. 57, No. 6, pp. 17-
25.
[8]. Baisa, G., (2011). “Wavelet based color image
watermarking scheme giving high robustness and exact
correlation”. In: International Journal of Emerging Trends
in Engineering and Technology, Vol. 1, No. 1, pp. 23-30.
[9]. Devapriya, M., Ramar, K., (2010). “Statistical Image
Watermarking In DWT with Capacity Improvement”. In:
Global Journal of Computer Science and Technology,
Vol. 10, No. 2, pp. 20-24.
[10]. Dinu, C., (2011). “Improved embedding for
prediction-based reversible watermarking”. In: IEEE
Transactions on Information Forensics and Security, Vol. 6,
No. 3, pp. 873-882.
[11]. Jih, P., Che, W., Wei, J., and Hung, H., (2010).
“Watermarking technique based on DWT associated with
embedding rule”. In: International Journal of Circuits,
Systems and Signal Processing, Vol. 4, No.2, pp. 72-82.
[12]. Chae, J.J., and Manjunath, B.S., (1999). “Data
hiding in video”. In: IEEE Proceedings of International
Conference on Image Processing (ICIP), pp. 243-246.
[13]. Sandeep, K., and Rajiv, B., (2013). “Enhanced
Technique for Watermarking using MFHWT”. In:
International Journal of Advanced Research in Computer
Science and Software Engineering, Vol. 3, No.5, pp.
1199-1202.
[14]. Umaamaheshvari, A., and Thanushkodi, K., (2012).
“A novel watermarking technique based on visual
cryptography”. In: International Journal of Advanced
Research in Computer Engineering and Technology, Vol.
1, No. 7, pp. 70-74.
[15]. Yang, C., and Tsai, M., (2010). “Improving histogrambased reversible data hiding by interleaving predictions”. In: IET Image Process, Vol. 4, No. 4, pp. 223-234.