References
[1]. Sabarinathan E, and Manoj E, (2015). “FPGA
Implementation of Shearlet Transform Based Invisible Image
Watermarking Algorithm”. In: i-manager’s Journal on Pattern
Recognition, Vol. 2, No. 2, pp. 19-28.
[2]. Arathi, C., and Chandra, M, (2012).
“Authentication
of Images Through Lossless Watermarking Technique with
the Aid of Elliptic Curve Cryptography (ECC)”. In:
International Journal of Computer Applications, Vol. 57,
No. 6, pp. 17-25.
[3]. Baisa, G, (2011). “Wavelet Based Color Image
Watermarking Scheme Giving High Robustness and Exact
Correlation”. In: International Journal of Emerging Trends
in Engineering and Technology, Vol. 1, No. 1, pp. 23-30.
[4]. Devapriya, M., and Ramar, K, (2010).
“Statistical
Image Water marking in DWT with Capacity
Improvement”. In: Global Journal of Computer Science
and Technology, Vol. 10, No. 2, pp. 20-24.
[5]. Dinu C, (2011). “Improved embedding for
prediction based
reversible watermarking”. In: IEEE Transactions on
Information Forensics and security, Vol. 6, No. 3, pp. 873-
882.
[6]. Jih, P., Che, W., Wei, J., and Hung, H, (2010).
“Watermarking technique based on DWT associated with
embedding rule”. In: International Journal of Circuits,
Systems and Signal Processing, Vol. 4, No. 2, pp. 72-82.
[7]. Anumol, T. J, Binson, V. A, and Soumya, R, (2013).
“FPGA Implementation of Low Power, High Speed, Area
Efficient Invisible Image Watermarking Algorithm for
Images”. In: International Journal of Scientific And
Engineering Research, Vol. 4, No. 8.
[8]. Sandeep, K., and Rajiv B, (2013). “Enhanced
Technique for Watermarking using MFHWT”. In: International Journal
of Advanced Research in Computer Science and
Software Engineering, Vol. 3, No. 5, pp. 1199-1202.
[9]. Umaamaheshvari, A., and Thanushkodi, K, (2012).
“A
novel watermarking technique based on visual
cryptography”. In: International Journal of Advanced
Research in Computer Engineering and Technology, Vol.
1, No. 7, pp. 70-74.
[10]. Yang, C., and Tsai, M., (2010). “Improving
histogram-based reversible data hiding by interleaving
predictions”. In: IET Image Process, Vol. 4, No. 4, pp. 223-
234.
[11]. Bo, O., Rongrong, N., and Gang. C, (2010). “A
high
payload histogram-based reversible watermarking using
linear prediction”. In: Sixth International Conference on
Intelligent Information Hiding and Multimedia Signal
Processing, pp. 446-449.
[12]. Pan, W., Coatrieux, G., Cuppens, N., Cuppens, F.,
and Roux, C, (2010). “An Additive and Lossless
Watermarking Method Based on Invariant Image
nd Approximation and Haar Wavelet Transform”. In: 32
Annual International Conference of the IEEE EMBS Buenos
Aires, pp. 4740-4743.
[13]. Sujatha, S., and Mohamed. S, (2010). “Feature
Based Watermarking Algorithm by Adopting Arnold
Transform”. In: Proceedings of Springer International
Conference on Information and Communication
Technologies ICT, pp.78-82.
[14]. Karthigaikumar, P., and Baskaran. K, (2010a).
Microelectronics. In: Elsevier. Available from: Elsevier
books.
[15]. Karthigaikumar. P., Anumol., and Baskaran, (2011).
“FPGA Implementation of High Speed Low Area DWT
Based Invisible Image Watermarking Algorithm”. In:
International Journal of System Architecture, Vol. 57, No.
4, pp. 404-411.
[16]. Karthigaikumar, P., and K Baskaran, (2010b).
“An
ASIC implementation of a low power invisible robust
watermarking processor”. In: International Journal of
System Architecture, Vol. 57, No. 4, pp. 404-411.
[17]. Tamilvanan, and Selvakumar, (2014). “FPGA
Implementation of Digital Watermarking System”. In: International
Journal of Computer Science and Mobile
Computing, Vol. 3, No. 4.
[18]. Rohollah Mazrae Khoshki, Sami Oweis, and Shumei
Wang, (2014). “FPGA Hardware Based Implementation of
an Image Watermarking System”. In: International Journal
of Advanced Research in Computer and Communication
Engineering, Vol. 3, No. 5.
[19]. Nallagarla Ramamurthy, and Varadarajan, (2012).
“Robust Digital Watermarking Scheme with Neural
Network and Fuzzy Logic Approach”. In: International
Journal of Emerging Technology and Advanced
Engineering, Vol. 2, No. 9.
[20]. Sameh Oueslati, Adnene Cherif and Bassel
Solaimane, (2011). “Adaptative Image Watermarking
Scheme Based on Neural Network”. In: International
Journal of Engineering Science and Technology, Vol. 3
No. 1.
[21]. BibiIsac V, and Santhi, (2011). “A Study on
Digital
Image and Video Watermarking Schemes using Neural
Networks”. In: International Journal of Computer
Applications, Vol. 12, No. 9.
[22]. Nanda yalamali, and Manjunath Asuti, (2012).
“An
Adaptive Image Watermarking Algorithm based on
Neural Networks”. In: International Journal of Scientific &
Engineering Research, Vol. 3, No. 7.
[23]. Remya, and Sumithra, (2013). “Development of
a
New Watermarking Algorithm for Telemedicine
Applications”. In: International Journal of Engineering
Research and Applications (IJERA), ISSN: 2248-9622, Vol.
3, No. 1, pp. 962-968.
[24]. Manoj, and Gireendranath, (2012). “Novel
Invisible
and Blind Watermarking Scheme for Copyright Protection
of Digital Images”. In : International Journal of
Engineering Research & Technology, Vol. 1, No. 7.
[25]. Shinfeng, and Shih, (2010). “Improving the
robustness of DCT-based image watermarking against
JPEG compression”. In: Elsevier, Computer Standards &
Interfaces, pp.54-60.
[26]. Tomaz, and Andrej, (2012). “Block–wise
authentication method for digital images”. In: Journal of
Electrical Engineering, Vol. 63, No. 5, pp. 289-295, ISSN(Online), ISSN
(Print) 1335-3632, DOI: 10.2478/v10187-
012-0042-6.
[27]. Veera, (2010). “A novel technique for image
steganography based on Block-DCT and Huffman
Encoding ” . 06/2010; abs/ 1006.1186(3). DOI:
10.5121/ijcsit.2010.2308.
[28]. Gouenou, et al. (2013). “Reversible
Watermarking
Based on Invariant Image Classification and Dynamic
Histogram Shifting”. In: IEEE, in: Press.
[29]. Rajendra, and Narawade, (2012). “Reduced
Pixel
Shifting and Improved Histogram Shifting Based
Reversible Watermarking for Cartoon Images”. In:
International Journal of Computer Science and
Telecommunications, Vol. 3, No. 4.
[30]. Shyang, Zhenfei, Zhe and Hao, (2011).
“Reversible
data hiding based on multilevel histogram modification
and sequential recovery”. In: Elsevier, International
Journal of Electronics and Communications, pp.814-
826.
[31]. Kiran and Kanwal Garg, (2015). “Watermark
Embedding and Extraction using Histogram Shifting and
Butterworth Filtering”. IJARCSSE, Vol. 5, No. 5, pp. 1481-
1487.
[32]. Umaamaheshvari, A., and Thanushkodi K, (2013).
“Robust image watermarking based on block based error
correction code”. In: International Journal of Advanced
Research in Computer Engineering and Technology, Vol.
1, No. 7, pp. 70-74.
[33]. Sujatha, and Mohamed, (2012). “A Novel DWT
Based
Blind Watermarking for Image Authentication”. In: International
Journal of Network Security, Vol. 14, No. 4,
pp. 223-228.
[34]. Hazem, and Nedal, (2010). “A robust Blind
color
image watermarking based on wavelet-tree bit host
difference selection”. ACM Digital Library, Vol. 90, No. 8,
pp. 2498-2512. 2010, DOI:10.1016/j.sigpro.2010.02.017.
[35]. Roseline, and Sumalatha, (2012). “Fuzzy Based
Chaotic and Logistic Method for Digital Watermarking
Systems”. In: International Journal of Scientific &
Engineering Research, Vol. 3, No. 6, ISSN 2229-5518.
[36]. Maruthu Perumal, and Vijayakumar, (2012).
“Sorted
Pixel Value Difference on Fuzzy Watermarking Scheme”.
In: Global Journals Inc. Vol. 12, No. 4.
[37]. Sridevi, (2013). “Digital Image Watermarking
using
Fuzzy Logic approach based on DWT and SVD”.
International Journal of Computer Applications, Vol. 74,
No. 13, pp. 16-20.
[38]. Manikandan, R., Uma, M., and Mahalakshmi
Preethi, S, (2012). “Reversible Data Hiding for Encrypted
Image”. In: Journal of Computer Applications, Vol. 5, No.
1, pp. 104-110
[39]. A. Mohamed Zuhair., and Mohamed Yousuf, (2010).
“FPGA based image security and authentication in digital
camera using invisible watermarking technique”. In:
International Journal of Engineering Science and
Technology, Vol. 2, No. 6.
[40]. Ramezani, H., Keynia, F., Ramezani. F, (2013).
“A Novel Image Steganography in Contourlet domain using
Genetic Algorithm”. In: International Journal of Future
Computer and Communication, Vol. 2, No. 4, pp. 359-363.