References
[1]. Cox I.J, Kilian J, Leighton F.T, and Shamoon T, (1997).
“Secure Spread Spectrum Watermarking for Multimedia”.
IEEE Trans. Image Processing, Vol. 6, pp. 1673–1687.
[2]. Katzenbeisser S. and Petitcolas F.A.P (2000). Information
Hiding Techniques for Steganography and Digital
Watermarking. Artech House Publishers.
[3]. Voyatzis G. and Pitas I. (1998). “Chaotic watermarks
for embedding in the spatial digital image domain”. In
Proc. IEEE Int. Conf. Image Processing (ICIP'98), Chicago, IL.
[4]. Jiang Lung Liu, Der Chyuan Lou, Ming Chang Chang
and Hao Kuan Tso, (2006). “A Robust watermarking
scheme using self reference image”. Computer
Standards and Interfaces, Elsevier, pp. 356-367.
[5]. Chung-Ming Wang, Nan-I Wu, Chwei-Shyong Tsaib,
and Min-Shiang Hwang, (2007). “A high quality
steganographic method with pixel-value differencing
and modulus function”. The Journal of Systems and
Software, Vol. 81, pp. 150-158.
[6]. Cox I.J, Kilian J, Leighton F.T and Shamoon T. (1997). “Secure spread spectrum watermarking for multimedia”.
IEEE Trans. on Image Processing, Vol. 6, No. 12, pp. 1673-
1687.
[7]. Podilchuk C.I and Zeng W, (1998). “Image-adaptive
watermarking using visual models”. IEEE J. Select. Areas
Commun., Vol. 16, pp. 525–539.
[8]. S. Maruthuperumal, V. Vijayakumar and B. Vijayakumar,
(2012a). “Sorted Pixel Value Difference on Fuzzy
Watermarking Scheme”. GJCST, Vol. 12, No. 4, pp. 41-46.
[9]. S. Maruthuperumal, G. Roseline Nesakumari, and V.
Vijayakumar, (2012b). “Region BasedOdd Watermarking
Method with Fuzzy Wavelet”. International Journal of
Computer Engineering Science (IJCES), Vol. 2, No. 8, pp.
16-25.
[10]. USC SIPI. The USC-SIPI Image Database. Retrieved
from http://sipi.usc.edu/services/database/Database.html.
[11]. Gaurav Bhatnagar, Balasubramanian Raman, and
Swaminathan K. (2008). “DWT-SVD based Dual Watermarking
st Scheme”. 1 IEEE International Conference on the Applications
of Digital Information and Web Technologies (IEEE-ICADIWT
2008), pp.526-531.
[12]. Saeed K. Amirgholipour, Ahmad R. Naghsh-Nilchi,
(2009). “Robust Digital Image Watermarking Based on
Joint DWT-DCT”. International Journal of Digital Content
Technology and its Applications, pp. 42- 54, Vol. 3, No. 2.
[13]. Sameh Oueslati, Adnane Cherif, and Bassel
Solaiman, (2011). “A Fuzzy Watermarking System Using the
Wavelet Technique for Medical Images”. International
Journal of Research and Reviews in Computing Engineering,
Vol. 1, No. 1.
[14]. Wei-Che Chen, and Ming-Shi Wang, (2009). “A fuzzy
c-means clustering-based fragile watermarking scheme
for image authentication”. Expert Systems with Applications,
Vol. 36, pp. 1300-1307.