REFERENCES
- J. C. Patra, J. E. Phua and C. Bornand. (2010). “A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression,” Elsevier Digit. Signal Process. 20 (6), pp. 1597–1611.
- B. P. Devi, K. M. Singh and S. Roy. (2015). “A watermarking scheme for digital images based on visual cryptography,” Contemp. Eng. Sci. 8 (32), pp. 1517–1528.
- B. P. Devi, K. M. Singh and S. Roy. (2016). “A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography,” SpringerPlus 5, 1091.
- F. Petticolasand S. Katzenbeisser, Information Hiding Techniques for Steganography and Digital Watermarking. Boston, MA: Artech House Inc, 1999.
- F. Hartung and M. Kutter. (1999). “Multimedia watermarking techniques,” Proc. IEEE 87 (7), pp. 1079–1107.
- J. J. K. Ò. Ruanaidh and T. Pun. (1998). “Rotation, scale and translation invariant spread spectrum digital image watermarking,” Elsevier Signal Process. 66 (3), pp. 303–317.
- I. J. Cox and M. L. Miller. (2002). “The first 50 years electronic watermarking,” Eurasip J. Appl. Signal Process. 2, pp. 126–132.
- C.-S. Hsu and Y. C. Hou. (2005). “Copyright protection scheme for digital images using visual cryptography and sampling methods,” Opt. Eng. 44 (7), pp. 077003-1–077003-10.
- R. J. Hwang. (2000). “A digital image copyright protection scheme based on visual cryptography,” Tamkang J. Sci. Engg. 3 (2), pp. 97–106.
- M. A. Hassan and M. A. Khalili. (2005). “Self watermarking based on visual cryptography,” World Acad. Sci. Eng. Technol. 8, pp. 159–162.
- K. M. Singh. (2009). “Dual watermarking scheme for copyright protection,” IJCSES 3 (2), pp. 99–106.
- D.-C. Lou, H.-K. Tso and J.-L. Liu. (2007). “A copyright protection scheme for digital images using visual cryptography technique,” Elsevier Comput. Stand. Int. 29 (1), pp. 125–131.
- T. H. Chen, C. C. Chang, C. S. Wu and D. C. Lou. (2009). “On the security of a copyright protection scheme based on visual cryptography,” Elsevier Comput. Stand. Int. 31 (1), pp. 1–5.
- S. Rawat and B. Raman. (2012). “A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion,” Elsevier AEU 66 (11), pp. 955–962.
- M.-S. Wang and W.-C. Chen. (2007). “Digital image copyright protection scheme based on visual cryptography and singular value decomposition,” Optical Imaging 46 (6), pp. 067006-1–067006-8.
- J.-M. Guo and H. Prasetyo. (2014). “False-positive-free SVD-based image watermarking,” Elsevier J. Vis. Commun. Image Represent. 25 (5), pp. 1149–1163.
- Y. Wang, K.-W. Wong, X. Liao, T. Xiang and G. Chen. (2009). “A chaos-based image encryption algorithm with variable control parameters,” Elsevier Chaos Solitons Fractals 41 (4), pp. 1773–1783.
- F. J. Dyson and H. Falk. (1992). “Period of a discrete cat mapping,” Amer. Math. Mon. 99 (7), pp. 603–614.
- M. Naor and A. Shamir, “Visual cryptography,” In: A De Santis (eds), Advances in cryptography, Eurocrypt94, LNCS950. Berlin: Springer.
- A. Karmakar, A. Phadikar, B. S. Phadikar and G. K. Maity. (2016). “A blind video watermarking scheme resistant to rotation and collusion attack,” Elsevier Comput. Inform. Sci. 28, pp. 199–210.