References
- Agreste , S. 2007 . “ Watermark for digital images ” . Ph.D. thesis, Milan University
- Agreste , S. and Andaloro , G. 2008 . A new approach to pre-processing digital image for wavelet-based watermark . J. Comput. Appl. Math. , 221 : 274 – 283 .
- Agreste , S. , Andaloro , G. , Prestipino , D. and Puccio , L. 2006 . An image adaptive, wavelet-based watermarking of digital images . J. Comput. Appl. Math. , 210 : 13 – 21 .
- Barni , M. , Bartolini , F. and Piva , A. 2001 . Improved wavelet-based watermarking through pixel wise masking . IEEE Trans. Image Process. , 10 : 783 – 791 .
- Bradley , A. 1999 . A wavelet visible difference predictor . IEEE Trans. Image Process. , 8 : 717 – 730 .
- Craver , S. , Memon , N. , Yeo , B. and Young , M. 1997 . On the invertibility of invisible watermarking techniques . Proc. IEEE Int. Conf. Image Process. , 1 : 540 – 543 .
- Dawei , Z. , Guanrong , C. and Wenbo , L. 2004 . A chaos-based robust wavelet-domain watermarking algorithm . Chaos Solitons Fractals , 22 : 47 – 54 .
- Ho , A. , Shen , J. , Chow , A. and Woon , J. Robust digital image-in-image watermarking algorithm using the fast hadamard transform . ISCAS ’03: Proceedings of the 2003 International Symposium on Circuits and Systems . Vol. 3 , pp. III–826 – III–829 .
- Huang , C. and Wu , J. 2004 . Attacking visible watermarking schemes . IEEE Trans. Multimedia , 6 : 16 – 30 .
- Kutter , M. and Petitcolas , F. 2000 . Fair evaluation methods for image watermarking systems . J. Electron. Imaging , 9 : 445 – 455 .
- Li , X. and Xue , X. Improved robust watermarking in DCT domain for color images . AINA’04: Proceedings of the 18th International Conference on Advanced Information Networking and Applications . pp. 53 IEEE Computer Society, Washington, DC, USA
- Mukherjee , D. P. , Maitra , S. and Acton , S. 2004 . Spatial domain digital watermarking of multimedia objects for buyer authentication . IEEE Trans. Multimedia , 6 : 1 – 15 .
- Nikolaidis , N. and Pitas , I. 1998 . Robust image watermarking in the spatial domain . Signal Process. , 66 : 385 – 403 .
- Peticolas , F. A.P. 2000 . Watermarking schemes evaluation . IEEE Signal Process. Mag. , 17 : 58 – 64 .
- Peticolas , F. A.P. , Anderson , R. J. and Kuhn , M. G. Attacks on Copyright Marking System . Second Workshop on Information Hiding, Lecture Notes in Computer Science Vol 1525 . Portland, Oregon, USA. pp. 218 – 238 .
- Scott , C. 2004 . The Neyman–Pearson criterion . Available at http://cnx.org/content/m11548/1.2/
- TheWIPOCopyright Treaty, Diplomatic Conference On Certain Copyright And Neighboring Rights Questions, Geneva, 1996. Available at http://www.gseis.ucla.edu/iclp/wipo1.htm
- Voloshynovskiy , S. , Pereira , S. , Iquise , V. and Pun , T. 2001 . Attack modelling: Towards a second generation watermarking benchmark . Signal Process. , 8 : 117 – 1214 .