bibliography aase, s.o., husoy, j.h. and...

22
BIBLIOGRAPHY Aase, S.O., Husoy, J.H. and Waldemar, P. (1999) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16. Ahmed, F. and Moskowitz, I.S. (2005) Composite Signature Based Watermarking for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8. Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2011) Blind Image Watermarking Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893. Ali, J.M.H. and Hassanien, A.E. (2003) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104. Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512. Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp.86-106. Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple watermarking approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5. Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008 Barni, M. and Bartolini, F. (2004) Watermarking systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York. Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Watermarking Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.

Upload: nguyenliem

Post on 20-Aug-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

BIBLIOGRAPHY

Aase, S.O., Husoy, J.H. and Waldemar, P. (1999) A Critique of SVD-Based Image Coding Systems, IEEE International Symposium on Circuits and Systems VLSI, Orlando, FL, Vol. 4, Pp. 13-16.

Ahmed, F. and Moskowitz, I.S. (2005) Composite Signature Based Watermarking for Fingerprint Authentication, ACM Multimedia and Security Workshop, New York, Pp.1-8.

Akhaee, M.A., Sahraeian, S.M.E. and Jin, C. (2011) Blind Image Watermarking Using a Sample Projection Approach, IEEE Transactions on Information Forensics and Security, Vol. 6, Issue 3, Pp.883-893.

Ali, J.M.H. and Hassanien, A.E. (2003) An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol. 5, No. 2, Pp. 93-104.

Al-Otum, H.M. and Samara, N.A. (2009) A robust blind color image watermarking based on wavelet-tree bit host difference selection, Signal Processing, Vol. 90, Issue 8, Pp. 2498-2512.

Ateniese, G., Blundo, C., De Santis, A. and Stinson, D.R. (1996) Visual cryptography for general access structures, Information Computation, Vol. 129, Pp.86-106.

Baaziz, N., Zheng, D. and Wang, D. (2011) Image quality assessment based on multiple watermarking approach, IEEE 13th International Workshop on Multimedia Signal Processing (MMSP), Hangzhou, Pp.1-5.

Bao, F., Deng, R., Deing, X. and Yang, Y. (2008) Private Query on Encrypted Data in Multi-User Settings, Proceedings of 4th International Conference on Information Security Practice and Experience (ISPEC 2008), Pp. 71-85, 2008

Barni, M. and Bartolini, F. (2004) Watermarking systems engineering: Enabling digital assets security and other application, Signal processing and communications series, Marcel Dekker Inc., New York.

Barni, M., Bartolini, F. and Piva, A. (2001) Improved Wavelet based Watermarking Through Pixel-Wise Masking, IEEE Transactions on Image Processing, Vol. 10, Pp. 783-791.

Behnia, S., Teshnehlab, M. and Ayubi, P. (2010) Multiple-watermarking scheme based on improved chaotic maps, Communications in Nonlinear Science and Numerical Simulation, Vol. 15, Issue 9, Pp. 2469-2478.

Bell, A. (1999) The dynamic digital disk, Spectrum, IEEE, Vol. 36, No. 10, Pp. 28 -35.

Bender, W., Gruhl, D., Morimoto, N. and Lu, A. (1996) Techniques for data hiding, IBM System Journal, Vol. 35, No.3/4, Pp. 313-336.

Bert, D. and Cave, F. (2000) Construction of Finite Labelled Transition Systems from B Abstract Systems, W. Grieskamp, T. Santen B. Stoddart, eds, Proceedings of the Second International Conference on Integrated Formal Methods, Lecture Notes in Computer Science, Springer-Verlag, Germany, Vol. 1945, Pp. 235-254.

Bhatnagar, G. and Raman, B. (2009) A new robust reference watermarking scheme based on DWT-SVD, Computer Standards and Interfaces, Vol. 31, No. 5, Pp. 1002-1013.

Boland F.M., Ruanaidh J.J.K., Dautzenberg C., (1995) Watermarking digital images for copyright protection, Proc. IEE Int. Conf. on Image Processing and its Applications, Edinburgh, U.K., Pp. 326-330.

Bonnis, A. and Santis, A. (2004) Randomness in secret sharing and visual cryptography schemes, Theor. Comput. Sci, Vol. 314, Pp 351-374.

Bors, A.G. and Pitas, I. (1998) Image watermarking using block site selection and DCT domain constraints, Optical Express, Vol. 3, Pp. 512-523.

Bounkong, S., Toch, B., Saad, D. and Lowe, D. (2003) ICA for watermarking digital images, Journal of Machine Learning Research, Vol. 4, Pp. 1471-1498.

Campisi, P., Kundur, D., Hatzinakos, D. and Neri, A. (2002) Compressive data hiding: An unconventional approach for improved color image coding, EURASIP Journal on Applied Signal Processing, Vol. 2, Pp. 152-163.

Chamlawi, R., Khan, A. and Idris, A. (2007) Wavelet based image authentication and recovery, Journal of Computer Science and Technology, Springer, Vol. 22, No.6, Pp. 795-804.

Chamlawi, R., Khan, A. and Usman, I. (2010) Authentication and recovery of images using multiple watermarks, Computers and Electrical Engineering, Elsevier Science, Vol. 36, No. 3, Pp. 578-584.

Chang, C., Tsai, C. and Chen, T. (2000) A new scheme for sharing secret color images in computer network, Proceedings of International Conference on Parallel and Distributed Systems, Pp. 21-27.

Chang, C.C. and Yu, T.X. (2002) Sharing a Secret Gray Image in Multiple Images, Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Pp.230-237.

Chang, C.C., Fan, Y.H. and Tai, W.L. (2008) Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition, Elsevier Science, Vol. 41, Pp. 654-661.

Chen, B. and Wornell, G.W. (2001) Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding, IEEE Transaction on Information Theory, Vol. 47, No. 4, Pp. 1423-1443.

Chen, C.C., Fan, K.C., Wen, S. and Chuang. H. (2003) A Wavelet-Based Public Key image Authentication Watermarking, Proceedings of IEEE 37th International Conference on Security Technology, Pp. 321 - 324

Chen, M., Chen, Z., Zeng, X. and Xiong, Z. (2009) Reversible image watermarking based on full context prediction, 16th IEEE International Conference on Image Processing (ICIP), Pp. 4253-4256.

Chen, T. Z., Horng, G. and Wang, S. H. (2003) A Robust Wavelet Based Watermarking Scheme using Quantization and Human Visual System Model, Proceedings of the Pakistan Journal of Information and Technology, Vol. 2, Pp. 212-230.

Chen, W.Y., Lin, J.T., Lin, C.Y. and Liu, J.R. (2007) Multiple Watermarking Scheme Using Adaptive Phase Shift Keying Technique, The 23rd Workshop on Combinatorial Mathematics and Computation Theory, Vol. 46, No. 6, Pp.207-214

Chi, K.H. and Li, L.C.T. (2004) Semi-fragile watermarking scheme for authentication of JPEG images, Proceedings of International Conference on Information Technology: Coding and Computing (ITCC’04), Vol. 2, Pp.7-11.

Coatrieux, G. Lamard, M. Daccache, W. Puentes, W. Roux, C. (2006) A Low Distorsion and Reversible Watermark: Application to Angiographic Images of the Retina, 27th Annual International Conference of the Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005, Pp. 2224-2227.

Coltuc, D. (2011) Improved Embedding for Prediction-Based Reversible Watermarking, IEEE Transactions on Information Forensics and Security, Vol.6, Issue 3, Pp. 873-882.

Cox, I. and Miller, M. (1997) A review of watermarking and the importance of perceptual modeling, Proceedings of the SPIE/IST& T Conference on Human Vision and Electronic Imaging II, SPIE, San Jose, CA, Vol. 3016, Pp. 92-99.

Cox, I.J. , Kilian, J., Leighton, T. and Shamoon, T. (1997) Secure spread spectrum watermarking for multimedia, IEEE Transactions on Image Processing, Vol. 6, No. 12, Pp. 1673-1687.

Cox, J., Miller, M.L., Bloom, J.A., Fridrich, J. and Kalker, T. (2008) Digital watermarking and steganography, Second ed.., Elsevier.

Daugman J and Downing C (2001) Epigenetic randomness, complexity, and singularity of human iris patterns, Proceedings of the Royal Society, B, 268, Biological Sciences, Pp 1737 - 1740.

Depovere, G., Kalker, T., Haitsma, J., Maes, M., de Strycker, L., Termont, P., Vandewege, J., Langell, A., Alm, C., Norman, P., O’Reilly, G., Howes, B., Vaanholt, H., Hintzen, R., Donnelly, P. and Hudson, A. (1999) The viva project: digital watermarking for broadcast monitoring, Proceedings of International Conference on Image Processing, Vol. 2, Pp. 202-205.

Dharwadkar, N.V., Amberker, B.B. and Joshi, S.R. (2010) Visual Cryptography for Color Image using Color Error Diffusion, ICGST-GVIP Journal, Vol. 10, Issue 1, Pp.1-8.

Dili, R.B. and Mwangi, E. (2007) An Image Watermarking method based on the singular value transformation and the wavelet transformation, Proceedings on IEEE AFRICON Press, Pp.1-5

Dumitrescu, S., Wu, X., Wang, Z., (2003) Detection of LSB Steganography via Sample Pair Analysis IEEE Trans. Signal Process, Vol. 51, Pp. 355-372.

El Bakrawy, L.M., Ghali, N.I., Hassanien, A. and Kim, T. (2011) A Rough K-means Fragile Watermarking Approach for Image Authentication, Proceedings of the Federated Conference on Computer Science and Information Systems, Pp. 19-23.

El-Hadedy, M., Pitsilis, G. and Knapskog, S.J. (2011) An Efficient Authorship Protection Scheme for Shared Multimedia Content, Sixth International Conference on Image and Graphics, IEEE Computer Society, Pp. 914-919.

Eskicioglu, A. and Delp, E.(2001) An overview of multimedia content protection in consumer electronics devices, Proceedings Signal Processing Image Communication, Vol. 16 PPp. 681-699.

Feng, J.B., Lin, I.C., Tsai, C.S. and Chu, Y.P. (2006) Reversible Watermarking: Current Status and Key Issues, International Journal of Network Security, Vol.2, No.3, Pp.161-171.

Feng, X., Zhang, H., Wu, H.C. and Wu, Y. (2011) A New Approach for Optimal Multiple Watermarks Injection, IEEE Signal Process Letters, Vol. 18, Issue 10, Pp. 575-578.

Fridrich, J. and Goljan, M. (1999) Images with self-correcting capabilities, Proceedings of IEEE International Conference on Image Processing, Vol. 3, Pp. 792 - 796 .

Ganic, E. and Eskicioglu, A.M. (2004a) Robust digital watermarking: Robust DWT-SVD domain image watermarking : embedding data in all frequencies, Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security, ACM, New York, Pp. 166-174.

Ganic, E. and Eskicioglu, A.M. (2004b) Secure DWT-SVD Domain Image Watermarking: Embedding Data in All Frequencies, ACM Multimedia and Security Workshop 2004, Magdeburg, Germany, Pp.1-9.

Giakoumaki, A., Pavlopoulos, S. and Koutsouris, D. (2003) A medical image watermarking scheme based on wavelet transform, Proc. 25th Ann. Int. Conf. IEEE-EMBS 2003, Pp. 856-859.

Gilles, S. (1998) Robust description and matching of images, PhD Thesis, University of Oxford.

Gonzalez-Serrano, F.J., Molina-Bulla, H.Y. and Murillo-Fuentes, J.J. (2001) Independent component analysis applied to digital image watermarking, International Conference on Acoustic, Speech and Signal Processing (ICASSP), Vol. 3, Pp. 1997-2000.

Hartung, F. and Kutter, M. (1999) Multimedia watermarking techniques, Proceedings of the IEEE, Vol. 87, No. 7, Pp. 1079 -1107.

Hawkes, L., Yasinsac, A., Cline, C. (2000) An Application of Visual Cryptography to Financial Documents; technical report TR001001, Florida State University.

Hien, T.D., Nakao, Z. and Chen, Y.W. (2006) Robust multi-logo watermarking by RDWT and ICA, Signal Processing, Elsevier, Vol. 86, Pp.2981-2993.

Holiman, M. and Memon, N. (2000) Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, Vol. 9. No.3, Pp. 432-441.

Hou, Y.C. (2003) Visual cryptography for color images, Pattern Recognition, Vol. 36, Issue 7, Pp. 1619-1629

Houmansadr, A. and Ghaemmaghami, S. (2005) A Digital Image Watermarking Scheme Based on Visual Cryptography, International Symposium on Telecommunications, Pp.1-5.

Hsieh, M.S. and Tseng, D.C. (2001) Hiding digital watermarks using multiresolution wavelet transform, IEEE Transactions on Industrial Electronics, Vol. 48, No.5, Pp. 875-882.

Hsu, C.T. and Wu, J.L. (1998) Multi-resolution Watermarking for Digital Images, IEEE Transactions on Circuits and System—II Analog and Digital Signal Processing, Vol. 45, Pp. 1097-1101.

Hsu, C.T. and Wu, J.L. (1999) Hidden digital watermarks in images, IEEE Transactions on Image Processing, Vol. 8, No. 1, Pp. 58-68.

Hu, Y.P. and Han, D.Z. (2005) Using two semi-fragile watermarks for image authentication, Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou China, Vol.9, Pp. 5484 - 5489.

Hui, K., Jing, L., Xiao-dong, Z. and Xiao-xu, Z. (2008) Study on Implementation of a Fingerprint Watermark, International Conference on Computer Science and Software Engineering (CSSE), Vol. 3, Pp.725-728.

Hung, K.L., Chang, C.C. and Chen, T.S. (2001) Secure discrete cosine transform based technique for recoverable tamper proofing Optical Engineering, Vol. 40, Pp. 1950-1958.

Hussein, J. and Mohammed, A. (2009) Robust Video Watermarking using Multi-Band Wavelet Transform, IJCSI International Journal of Computer Science Issues, Vol. 6, No. 1,Pp. 44-49.

Hyvarinen A. (1999) Fast and robust fixed-point algorithms for independent component analysis, IEEE Trans. on Neural Networks, Vol. 10, No.3, Pp. 626-634.

Irany, B.M., Guo, X.C. and Hatzinakos, D. (2011) A high capacity reversible multiple watermarking scheme for medical images, 17th International Conference on Digital Signal Processing (DSP), Pp. 1-6.

Jain, A.K., Uludag, U. and Hsu, R.K. (2002) Hiding a face in a fingerprint image, Proceedings of International Conference on Pattern Recognition, Vol. 3, Pp.756-759.

Jiang, J. and Weng, Y. (2008) Robust multiple watermarking in color images with correlation coefficient detector, Proceeding of the 8th IASTED International Conference on Visualization, Imaging and Image Processing (VIIP 2008), Palma de Mallorca, Spain, Pp.280-285.

Johnson, N. F. and Jajodia, S. (1998) Exploring steganogaphy: Seeing the unseen. Computer, Vol. 31, No.2, Pp. 26-34.

Johnson, N.F. (1999) An Introduction to Watermark Recovery from Images, Proceedings of the SANS Intrusion Detection and Response Conference (IDR'99), San Diego, CA, Pp.1-6.

Jutten C. and Herault J. (1991) Blind separation of source .Part I: An adaptive algorithm based on neuromimetic architecture, Signal Processing, Vol.24, No.1, Pp.1-10.

Kadir, T. and Brady, M. (2001) Saliency, scale and image description, International Journal of Computer Vision, Pp. 83-105.

Kahaner, D., Moler, C. and Nash, S. (1989) Numerical Methods and Software, Prentice-Hall Inc., New Jersey.

Kankanhalli, M.S., Ramakrishnan, K.R. and Rajmohan (1998) Content basedwatermarking of images, International Multimedia Conference, Proceedings of the sixth ACM international conference on Multimedia, Pp. 61-70.

Karkarala, R. and Ogunbona, P.O. (2001) Signal Analysis Using a Multiresolution Form of the Singular Value Decomposition, IEEE Transactions on Image Processing, Vol. 10, No.5, Pp. 724-735.

Kay, S. and Izquierdo, E. (2001) Robust content based image watermarking, Proceedings of Workshop on Image Analysis for Multimedia Interactive Services,WIAMIS’ 2001, Tampere, Finland, Pp.1-4.

Kejariwal, A., Gupta, S., Nicolau, A., Dutt, N.D. and Gupta, R. (2006) Energy Efficient Watermarking on Mobile Devices Using Proxy-Based Partitioning,

IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 14, No. 6, Pp. 625- 636.

Ker, A., (2004) Improved Detection of LSB Steganography in Grayscale Images, Proc. The 6th Information Hiding Workshop, Vol. 3200, Pp. 97-115.

Khan, A. (2006a) Intelligent perceptual shaping of a digital watermark, Faculty of Computer Science and Engineering, Ghulam Ishaq Khan Institute of Engineering Sciences and Technology, Pakistan.

Khan, A. (2006b) A Novel approach to decoding: exploiting anticipated attack information using genetic programming, International Journal of Knowledge-Based Intelligent Engineering System, Vol. 10, No.5, Pp. 337-347.

Khan, A., Tahir, S.F., Majid, A. and Choi, T.S. (2008) Machine learning based adaptive watermark decoding in view of an anticipated attack, Pattern Recognition, Elsevier Science, Vol. 41, Pp.2595-2610.

Kim, H.S., Baek, Y., Lee, H.K. and Suh, Y.H. (2003a) Robust image watermark using radon transform and bispectrum invariants, Lecture Notes in Computer Science, Springer, Vol. 2578, Pp. 145-159.

Kim, M. and Lee, W. (2004) A Content-Based Fragile Watermarking Scheme for Image Authentication, Lecture Notes in Computer Science, Content Computing, Springer Berlin / Heidelberg, Vol. 0302/2004, Pp. 258-265.

Kim, Y., Moon, K. and Oh, I. (2003b) A text watermarking algorithm based on word classification and inter-word space statistics, Proceedings Seventh International Conference on Document Analysis and Recognition, Pp.775 -779.

Kim, Y.S., Kwon, O.H. and Park, R.H. (1999) Wavelet-based watermarking method for digital images using the human visual system, Electronic Letters, Vol. 5, No. 6, Pp. 466-468.

Kino, M. and Wada, S. (2004) Wavelet-based perceptual watermarking with bit data embedded in still color images, Electronics and Communications in Japan (Part III: Fundamental Electronic Science), Vol. 87, Pp. 1-9.

Ko, C.C. and Huang, C.H. (2004) A novel semi-fragile watermarking technique for image authentication, Proceedings of 6th IASTED International Conference on Signal and Image Processing (SIP’04), Honolulu, Hawaii, Pp. 24-29.

Ko, L.T., Chen, J.E., Shieh, Y.S., Hsin, H.C. and Sung, T.Y. (2012) Nested Quantization Index Modulation for Reversible Watermarking and Its

Application to Healthcare Information Management Systems, Computational and Mathematical Methods in Medicine Vol. 2012, Article ID 839161, Pp.1-8.

Koch, E. and Zhao, J. (1995) Towards robust and hidden image copyright labelling, IEEE Proceedings On International Workshop on non linear Signals and Image Processing, Marmaras, Greece, Pp. 1-4.

Komatsu, N. and Tominaga, H. (1988) Authentication system using concealed image in telematics, Memoirs of the School of Science and Engineering, Waseda University, Vol. 52, Pp. 45-60.

Konstantinides, K., Natarajan, B. and Yovanof, G.S. (1997) Noise Estimation and Filtering Using Block-Based Singular Value Decomposition, IEEE Transactions on Image Processing, Vol. 3, No.3, Pp. 479-483.

Koz, A. (2002) Digital Watermarking Based on Human Visual System, The Graduate School of Natural and Applied Sciences, The Middle East Technical University, Pp 2-8.

Kundur, D. and Hatzinakos, D. (1999) Digital watermarking for telltale tamper proofing and Authentication, Proceeding of IEEE, Vol.87, No.7, Pp.1167-1180.

Kundur, D. and Hitzinakos, D. (1997) A robust digital image watermarking method using wavelet-based fusion, Proceedings of International Conference on Image Processing, Washington DC, USA, Vol.1, 544-547.

Lähetkangas, E. (2005) Digitaalisen kuvan vesileimaus, Diploma Thesis, University of Oulu, Department of Electrical and Information Engineering, Finland.

Lai, C.C., Huang, H.C. and Tsai, C.C. (2008) Image Watermarking Scheme Using Singular Value Decomposition and Micro-genetic Algorithm, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP '08, Pp. 469-472.

Lee, S., Jang, D. and Yoo, C.D. (2005) An SVD-Based Watermarking Method for Image Content Authentication with Improved Security, in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, PA, Pp. 525-528.

Lee, S.J. and Jung, S.H. (2001) A Survey of Watermarking Techniques Applied to Multimedia, Proceedings of IEEE International Symposium on Industrial Electronics, Vol. 1, Pp. 272-277.

Li, C.T. and Si, H. (2007) Wavelet-based fragile watermarking scheme for image authentication, J. Electron. Imaging, Vol. 16, Issue 1, Pp. 17-22.

Li, K.F., Chen, T.S. and Wu, S.C. (2001) Image tamper detection and recovery system based on discrete wavelet transformation, IEEE Proceedings of the International Conference on Communications, Computers and Signal Processing, Vol. 1, 164 - 167

Li, Q., Yuan, C. and Zhong, Y. (2007) Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model, Proceedings of 9th International Conference on Advanced Communication Technology, Vol. 3, Pp. 1947-1951.

Liang, W., Xu, J. and Long, J. (2011) A High-capacity Lossless Algorithm for Watermarking Binary Images, Research Journal of Information Technology, Vol. 3, Pp. 229-236.

Lim, S., Lee, K., Byeon, O. and Kim, T. (2000) Effective Iris Recognition System by Optimized Feature Vectors and Classifier, Artificial Intelligence : Methodology, Systems and Applications, Lecture Notes in Computer Science, Vol. 1904/2000, Pp. 1-20.

Lim, Y., Xu, C. and Feng, D.D. (2001) Web based image authentication using invisible Fragile watermark, ACM International Conference Proceeding Series; Vol. 147, Proceedings of the Pan-Sydney area workshop on Visual information processing, Vol. 11,Pp. 31-34.

Lin, C., Pan, J.S. and Lu, Z.M. (2008) A Double Domain Based Robust Digital Image Watermarking Scheme. Lecture Notes in Computer Science, Springer, Vol. 5093, Pp. 656- 663.

Lin, C.Y. (2000) Watermarking and digital signature techniques for multimedia authentication and copyright protection, PhD Thesis, Graduate School of Arts and Science, Columbia University, USA.

Lin, C.Y. and Chang, S.F. (2000) Semi-fragile watermarking for authentication of JPEG visual content, Proceedings of SPIE, San Jose Canada, PP.1-12.

Lin, C.Y. and Chang, S.F. (2001) A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 11, No.2, Pp. 153-168.

Lin, C.Y., Wu, M., Bloom, J.A., Cox, I.J., Miller, M.L. and Lui,Y.M. (2001) Rotation, scale and translation resilient watermarking for image, IEEE Trans.Image Processing, Vol.10, No.5, Pp.767-782.

Lin, P.L., Huang, P.W. and Ping, A.W. (2004) A fragile watermarking scheme for image authentication with localization and recovery, Proceedings of the IEEE Sixth International Symposium on Multimedia Software Engineering (ISMSE’04), IEEE Computer Society, USA, Pp. 146-153.

Liu, C.C. and Chen, W.Y. (2006) Multiple-watermarking scheme for still images using the discrete cosine transform and modified code division multiple-access techniques, Optical Engineering, Vol. 45, No.07, Pp.1-10.

Liu, H. and Steinebach, M. (2006) Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability, Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS '06), IEEE Computer Society, USA, Pp.143-152.

Liu, H., Lin, J., Sun, J. and Huang, Y.S. (2005) Image Authentication Using Content Based Watermark, Communication, IEEE, Pp.4014-4017.

Liu, J., Zhang, X., Sun, J. and Lagunas, M.A. (2003) A digital watermarking scheme based on ICA detection, 4th International Symposium on Independent Component Analysis and Blind Signal Separation, (ICA 2003), Nara, Japan, Pp. 215-220.

Liu, J.L., Lou, D.C., Chang, M.C. and Tso, H.K. (2006) A robust watermarking scheme using self-reference image, Computer Standards and Interface, Elsevier, Vol. 28, No. 3, Pp.356-367.

Liu, R. and Tan, T. (2002) A SVD-Based Watermarking Scheme for Protecting Rightful Ownership, IEEE Transactions on Multimedia, Vol. 4, No.1, Pp.121-128.

Loo, P. (2003) Digital Watermarking using complex wavelets, Signal Processing and Communication Laboratory, Department of Engineering, University of Cambridge, USA, Pp. 1-8.

Low, C.Y., Teoh, A.B. and Tee, C.(2009) Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection, Proceedings of the Third International Conference on Advances in Biometrics, Lecture Notes In Computer Science, Vol. 5558, Pp. 786 – 795.

Lu, C.S. and Liao, H.Y. (2001) Multipurpose watermarking for image authentication and protection, IEEE Trans. Image Process., Vol.10, Pp. 1579-1592.

Lu, C.S., Huang, S.K., Sze, C.J. and Liao, H.Y. (2001) A new watermarking technique for multimedia protection, Multimedia Image and Video Processing, Boca Raton, FL, Pp.1-32. Lu, Z.M., Xu, D.G. and Sun, S.H. (2005) Multipurpose image watermarking algorithm based on multistage vector quantization, IEEE Trans. Image Process., Vol. 14, No. 6, Pp. 822-831.

Luo, H., Lu, Z.M. and Pan, J.S. (2008) Multiple Watermarking in Visual Cryptography, Digital Watermarking, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Vol. 5041, Pp. 60-70

Luo, H., Yu, F.X., Chu, S.C. and Lu, Z.M. (2009) Hiding multiple watermarks in transparencies of visual cryptography, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 7, Pp. 1875-1882.

Luo, X. Y., Liu, F.L. (2007) A LSB Steganography Approach Against Pixels Sample Pairs Steganalysis, International Journal of Innovative Computing, Information and Control (IJICIC), Vol. 3, No. 3, Pp. 575-588.

Macq, B.M. and Quisquater, J. J. (1995) Cryptology for Digital TV Broadcasting, Proceedings of the IEEE, Vol. 83, No. 6, Pp. 944-957.

Maiorana, E., Campisi, P., Neri, A. (2007) Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques, IEEE Biometrics Symposium,2007, Pp. 1-6.

Makhloghi, M., Tab, F.A. and Danyali, H. (2011) A new robust blind DWT-SVD based digital image watermarking, 19th Iranian Conference on Electrical Engineering (ICEE), Pp.1-5.

Malathi, S. and Meena, C. (2010) Partial fingerprint matching based on SIFT Features, International Journal on Computer Science and Engineering, Vol. 2, No. 4, Pp. 1411-1414.

Masek, L. and Kovesi, P. (2003) MATLAB Source Code for a Biometric Identification System Based on Iris Patterns. The School of Computer Science and Software Engineering, The University of Western Australia.

Mathai, N.J., Kundur, D. and Sheikholeslami, A. (2003) Hardware Implementaion Perspectives of Digital Video Watermarking Algorithms, IEEE Trans. on Signal Processing, Vol. 51, No. 4, Pp. 925-938.

Meerwald, P. (2001) Digital Image Watermarking in the Wavelet Transform Domain, Master’s Thesis, University of Salzburg.

Mikolajczyk, K. and Schmid, C. (2004) Scale and affine invariant interest point detectors, International Journal of Computer Vision, Pp. 63-86.

Mintzer, F. and Braudaway, G.W. (1999) If one watermark is good, are more better?, Proceedings of IEEE International Conference in Acoustics, Speech, and Signal Processing, Vol. 4, Pp. 2067-2069.

Nakamura, T., Katayama, A., Yamamuro, M. and Sonehara, N. (2004) Fast Watermark Detection Scheme for Camera-equipped Cellular Phone, ACM International Conference Proceeding Series, Proceedings of the 3rdinternational conference on Mobile and ubiquitous multimedia, College Park, Maryland, Vol. 83, URL:http://portal.acm.org/citation.cfm?id=1052395, Pp. 101-108.

Naor, M. and Pinkas, B. (1997) Visual authentication and identification, Advances in Cryptology CRYPTO’97, Lecture Notes in Computer Science, Vol. 1294, Pp. 322-336

Naor, M. and Shamir, A. (1995) Visual cryptography, Advances in Cryptology - EUROCRYPT '94, A. De Santis, ed., Lecture Notes in Computer Science, Vol. 950, Pp. 1-12.

Narasimhulu, C.V. and Prasad, K.S. (2011) A New SVD based Hybrid Color Image Watermarking for Copyright Protection using Contourlet Transform, International Journal of Computer Applications, Vol. 2, No.8, Pp.18-28.

Nguyen, V.T. and Patra, J.C. (2004) Digital image watermarking using independent component analysis, PCM 2004, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3333, Pp. 364-371.

Nikolaidis, A., Tsekeridou, S., Tefas, A. and Solachidis, V. (2001) A survey on watermarking application scenarios and related attacks, IEEE international Conference on Image Processing, Vol. 3, Pp. 991- 993.

Noore, A., Singh, R., Vatsa, M. and Houck, M.M. (2007) Enhancing security of fingerprints through contextual biometric watermarking, Forensic Science International, Vol. 169, Issue 2, Pp. 188-194

Pankanti, S. and Yeung, M.M. (1999) Verification watermarks on fingerprint recognition and retrieval, Proc. SPIE EI 1999, San Jose, CA, Vol. 3657, Pp. 66-78.

Paquet, A.H., Zahir, S. and Ward, R.K. (2000) Wavelet Packets based Image retrieval, IEEE Int. Conf. Image Processing , Pp. 455-460.

Parameswaran, L. (2005) Content Dependent Image Signature for Authentication Using Wavelets, Proceedings of NCIS, Karunya Deemed University, Coimbatore, Nov.2005.

Parameswaran, L. and Anbumani, K. (2006) A Content Based Image Watermarking Scheme Resilient to Geometric Attacks, International Journal of Computer Science, Vol. 2, No. 2, Pp. 118-123.

Parthasarathy, A.K. and Kak, S. (2007) An Improved Method of Content Based Image Watermarking, IEEE Transactions On Broadcasting, Vol. 53, No. 2, Pp.468-479.

Paul, N., Evans, D., Rubin, A. and Wallach, D.: Authentication for remote voting, workshop on human-computer interaction and security systems, Fort Lauderdale, Florida, April (2003).

Potdar, V., Han, S. and Chang, E. (2005) A survey of digital image watermarking techniques, Proceedings of 3rd IEEE International Conference on Industrial Informatics, Frontier Technologies for the Future of Industry and Business, Perth, Australia, Pp. 709-716.

Radhakrishnan, R. and Memon, N. (2002) On the security of the digest function in the SARI image authentication system, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 12, No.11, Pp. 1030-1033.

Ratha, N.K., Connell, J.H. and Bolle, R.M. (2000) Secure data hiding in wavelet compressed fingerprint images, International Multimedia Conference, Proceedings of the 2000 ACM workshop on Multimedia, Pp. 127-130.

Raval, M.S. and Rege, P.P. (2003) Discrete wavelet transform based multiple watermarking scheme, Proceedings of the Convergent Technologies for the Asia-Pacific Region, Bangalore, India, Vol.3, Pp. 935-938.

Rezazadeh, S. and Rafiei, A. (2007) A secure quantization-based watermarking scheme using an improved statistical model in the wavelet domain,

International Conference on Information and Communication Technology, Bangladesh, Pp. 242-245.

Rhoads, G.B. (1995) Indentification/authentication coding method and apparatus, World Intellectual Property Organization, Vol. IPO WO 95/14289,

Roque, J.J. and Minguet, J.M. (2009) SLSB: Improving the Steganographic Algorithm LSB, The 7th International Workshop on Security in Information Systems (WOSIS 2009), Milan, Italy, Pp.1-11

Ryoung, K., Jeong, D.S., Kang, B.J. and Lee, E.C. (2007) A Study on Iris Feature Watermarking on Face Data, Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II, Lecture Notes In Computer Science; Vol. 4432, Pp. 414-423.

Sachs, D., Anand, R. and Ramchandran, K. (2000) Wireless image transmission using multiple-description based concatenated codes,Proceedings Data Compression Conference DCC 2000, P. 569.

Saha, S., Bhattacharrya, D. and Bandyopadhyay, S.K. (2010) Security on Fragile and Semi-fragile Watermarks Authentication, International Journal of Computer Applications, Vol. 3, No.4, Pp.23-27.

Sathiyaseelan, P., Bharathi, J., Swarnambigai, C. and Sujatha, V. (2011) Semi-fragile watermarking for 3D Models, International Journal of Research and Reviews in Software Engineering (IJRRSE), Vol. 1, No. 2, Pp. 35-38.

Schaathun, H.G. (2006) On watermarking/ fingerprinting for copyright protection, Proceedings of the First International Conference on Innovative Computing, Information and Control, IEEE Computer Society, Vol. 3, Pp. 50-53.

Schneider, M. and Chang, S.F. (1996) A robust content based digital signature for image authentication, Proceedings of International Conference on Image Processing, Vol.3, Pp.227-230.

SDMI (1999) Portable Device Specification Part 1, Technical Report, Secure Digital Music Initiative, Technical Report.

Seo, Y.H., Choi, S.Y., Park, S.H. and Kim, D.W. (2004) A digital watermarking algorithm using correlation of the tree structure of DWT coefficients, IEICE transactions on fundamentals of electronics, communications and computer sciences, Vol. E87-A, No.6, Pp.1347-1354.

Sheppard, N.P., Safavi-Naini, R. and Ogunbona, P. (2001) On Multiple Watermarking, Workshop on Security and Multimedia at ACM Multimedia, Ottawa, Canada, Pp. 3-6.

Shieh, C.S., Huang, H.C., Wang, F.H. and Pan, J.S. (2004) Genetic watermarking based on transform-domain techniques, Pattern Recognition, Elsevier Science, Vol. 37, Pp. 555-565.

Stankovic, S., Djurovic, I. and Pitas, I. (2001) Watermarking in the space/ spatial-frequency domain using two-dimensional radon-wigner distribution, IEEE Transactions on Image Processing, Vol.10, No.4, Pp.650-658.

Stinson, R. (1996) Cryptography: Theory and Practice, Boca Raton: CRC Press Inc.

Strycker, L.D., Termont, P., Vandewege, J., Haitsma, J., Kalker, T., Maes, M. and Depovere, G. (2000) Implementation of a Real-Time Digital Watermarking Process for Broadcast Monitoring on a TriMedia VLIW Processor, IEEE on Vision, Image and Signal Processing, Vol. 147, No. 4, 371-376.

Su, J.K. and Girod, B. (1999) On the imperceptibility and robustness of digital fingerprints, Proc. IEEE International Conference on Multimedia Computing and Systems, Vol.2, Pp. 530 - 535

Sun, J., Cao, Z. and Hu, Z. (2008) Multiple Watermarking Relational Databases Using Image, 2008 International Conference on Multimedia and Information Technology, Pp.373-376.

Sun, R., Sun, H. and Yao, T. (2002) A SVD-and Quantization Based Semi-fragile Watermarking Technique for Image Authentication, Proc. IEEE International Conference on Signal Processing, Beijing, China, Pp. 1592-1595.

Surekha, B., Swamy, G.N. and Roa, K.S. (2010) A Multiple Watermarking Technique for Images based on Visual Cryptography, International Journal of Computer Applications, Vol. 1, No. 11, Pp.77-81.

Suthaharan, S. (2004) Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, Elsevier Science, Vol. 25, No.16, Pp.1893-1903.

Suthaharan, S., Kim, S.W., Lee, H.K. and Sathananthan, S. (2000) Perceptually tuned robust watermarking scheme for digital images Pattern Recognition Letters, Elsevier Science, Vol. 21, No.2, Pp. 145-149.

Swanson, M., Kobayashi, M. and Tewfik, A. (1998) Multimedia data embedding and watermarking technologies, Proceedings of the IEEE, Vol. 86, No. 6, Pp. 1064-1087.

Tai, G.C. and Chang, L.W. (2005) Visual Cryptography for Digital Watermarking in Still Images, Advances in Multimedia Information Processing - PCM 2004, Category-Watermarking I, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Vol. 3332, Pp.50-57.

Takeuchi, S., Kunisa, A., Tsujita, K. and Inoue Y. (2005) Geometric Distortion Compensation of Printed Images Containing Imperceptible Watermarks, International conference on Consumer Electronics, 2005, Digest of Technical Papers. 8-12 Jan. 2005. Pp. 411-412.

Tao, P. and Eskicioglu. A. M. (2004) A robust multiple watermarking scheme in the discrete wavelet transform domain. In John R. Smith, Tong Zhang, and Sethuraman Panchanathan, editors, Proceedings of SPIE: Internet Multimedia Management Systems V, Vol. 5601, Pp.133-144.

Taubman, D.S. and Marcellin, M.W. (2002) JPEG2000: Image Compression Fundamentals, Standards and Practice. Norwell, MA: Kluwer.

Trichili, H., Boublel, M., Derbel, N., Kamoun, L. (2002) A new medical image watermarking scheme for a better telediagnosis, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics 2002, Vol.1, Pp.556-559.

Tsai, C.S., Chang, C.C. and Chen, T.S. (2001) Sharing multiple secrets indigital images, Department of Computer Science and Information Engineering, Taiwan. Pp. 1-8

Tsai, M.J., Yu, K.Y. and Chen, Y.Z. (2000) Joint Wavelet and spatial transformation for digital watermarking, IEEE Transactions on Consumer Electronics, Vol. 46, Pp. 241-245.

Tzouveli, P. Ntalianis, K. Kollias, S. (20050 Human face watermarking based on Zernike moments, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005, Pp. 399-404.

Uludag, U. (2003) Hiding biomtric data, IEEE Transactions on PAMI, Vol. 25, No.11, Pp.1494-1498.

Uludag, U., Gunsel, B. and Ballan, M. (2001) A spatial method for watermarking of fingerprint images, Proceedings of First International Workshop on Pattern Recognition in Information Systems, Setúbal, Portugal, Pp. 26-33.

Vatsa, M., Singh R., Noore, A., Houck, M.M. and Morris, K. (2006) Robust biometric image watermarking for fingerprint and face template protection, IEICE Electronics Expressp, Vol. 3, No.2, Pp.23-28.

Vatsa, M., Singh, R. and Noore, A. (2005) Improving biometric recognition accuracy and robustness using DWT and SVM watermarking, IEICE Electronics Express, Vol.2, No.12, Pp. 362-367.

Verheul, E. and Tilborg, H.V. (1997) Constructions and properties of k out of n visual secret sharing schemes, Designs, Codes and Cryptography, Vol. 11, No. 2, Pp.179-196.

Voloshynovskiy, S., Herrigel, A., Baumgartner, N. and Pun, T. (1999) A stochastic approach to content adaptive digital image watermarking, Proceedings of 3rd International Workshop on Information Hiding, Pp.211-236.

Waldemar P. and Ramstad, T.A. (1997) Hybrid KLT-SVD Image Compression, IEEE International Conference on Acoustics, Speech and Signal Processing, Munich, Germany,Vol. 4, Pp. 2713- 2716.

Wang, B., Sun, X., Ruan, Z. and Ren.H. (2011) Multi-mark: Multiple watermarking method for privacy data protection in wireless sensor networks, Information Technology Journal, Vol. 10, No. 4, Pp. 833-840.

Wang, C.T., Chen, T.S. and He, S.H. (2003) Detecting and restoring the tampered images based on iteration-free fractal compression, Journal of Systems and Software, Vol. 67, Pp.131-140.

Wang, H. J., Su, P. C. and Kuo, C.C.J. (1998) Wavelet-based digital image watermarking, Optics Express, Vol. 3, Pp. 491-496.

Wang, H.J. and Kuo, C.C.J. (1997) High fidelity image compression with multi-threshold wavelet coding (MTWC), SPIE Annual Meeting, Application of Digital Image Processing XX, Society of Photo-Optical Instrumentation Engineers, Pp.652-655.

Wolfgang, R.B. and Delp, E.J. (1996) A watermark for digital images, Proc. 1996 Int. Conference on Image Processing, Lausanne, Switzerland, Vol. 3, Pp. 219-222.

Wong, P.H.W. and Au, O.C.A. (2003) Blind watermarking technique for multiple watermarks, Proceedings of the 2003 International Symposium on Circuits and Systems, Vol.2, Pp. II-936 - II-939

Wong, P.H.W., Au, O.C. and Yeung, G.Y.M. (2003) A Novel Blind Multiple Watermarking Technique for Images, IEEE Trans on Circuits and Syst. For Video Technol., Vol. 13, No. 8, Pp. 813-830

Woo, C.S., Du, J. and Pham, B. (2005) Multiple watermark method for privacy control and tamper detection in medical images, Proc. Workshop on Digital Image Computing, Pp.1-6.

Xie, Z., Wang, S., Gan, L., Zhang, L. and Shu, Z. (2008) Content Based Image Watermarking in the Ridgelet Domain, International Symposium on Electronic Commerce and Security, Pp.877-881.

Yang, C. (2002) A note on Efficient Color Visual Encryption, Journal of Information Science and Engineering, Vol.18, pp 367- 372.

Yang, C. and Laih, C. (2000) New colored visual secret sharing schemes. Designs, Codes and Cryptography, Vol. 20, Pp.325-335.

Yang, H., Sun, X. and Sun, G. (2010) A semi-fragile watermarking algorithm using adaptive least significant bit substitution, Information Technology Journal, Vol. 9, No.1, Pp. 20-26.

Yang, Y. and Bao, F. (2008) Efficient Client-to-Client Password Authenticated Key Exchange, IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP 2008), Pp. 202-207.

Yang, Y. Deng, R., Bao, F. and Zhou, J. (2008b) Using Trusted Computing Technology to Facilitate Security Enforcement in Wireless Sensor Networks, 3rd Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008), Pp. 43-52.

Yang, Y., Bao, F. and Deng, R.H. (2003) Flexible Authentication of Images, Proceedings of Visual Communication and Image Processing Conference, Proc. SPIE 5150, Pp. 1905-1911.

Yang, Y., Ding, X., Deng, R. and Bao, F. (2008a) A Practical PIR Construction Using Trusted Hardware, Proc. 11th Information Security Conference (ISC 2008), Pp. 64-79.

Youmaran, R., Adler, A., Miri, A., (2006) An Improved Visual Cryptography Scheme For Secret Hiding, 23rd Biennial Symposium on Communications, Pp. 340-343.

Yu, D., Sattar, F. and Ma, K.K. (2002) Watermark detection and extraction using independent component analysis method, EURASIP Journal on Applied Signal Processing, Vol. 1, Pp. 92-104.

Yu, Y., Ling, H., Zou, F., Lu, Z. and Wang, L. (2012) Robust localized image watermarking based on invariant regions, Digital Signal Processing, Science Direct, Vol. 22, Issue 1, Pp. 170-180.

Yusof, Y. and Khalifa, O.O. (2007) Digital Watermarking For Digital Images Using Wavelet Transform, Proceedings of IEEE International Conference on Telecomunications, Pp.665-669

Zebbiche, K., Ghouti, L., Khelifi, F. and Bouridane, A. (2006) Protecting fingerprint data using watermarking, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS’06), Pp.451-456.

Zhang, X. and Wang, S. (2009) Fragile watermarking scheme using a hierarchical mechanism, Signal Processing, Vol. 89, Issue 4, Pp. 675-679.

Zhao, B., Dang, L., Kou, W. Zhang, J. and Cao,X. (2007) Design of secure watermarking scheme for watermarking protocol, Advances in Multimedia Information Processing, Lecture Notes in Computer Science, Vol. 4810/2007, Pp. 357-366.

Zhou, B. and Chen, J. (2004) A Geometric Distortion Resilient Image Watermarking Algorithm Based on SVD, Chinese Journal of Image and Graphics, Vol. 9, Pp. 506-512.

Zhou, X., Duan, X. and Wang, D. (2004) A Semi-Fragile Watermark Scheme for Image Authentication, Proceedings of the 10th International Multimedia Modeling Conference (MMM’04), Australia, Pp.374-377.

BOOKS

WEB REFERENCES

Coifman, R.R. and Wickerhauser, M.V. (1990) Best adapted wave packets basis, Preprint Yale University, New Haven, CT. http://www.math.yale.edu/pub/wavelets/papers/ bestbase.tex, Last Access Date: 03-02-2012.

Digimarc (2006) Digimarc Mobile E-Commerce Pilot Debuts at Popular Tokyo-based Maid in Japan Café, http://www.digimarc.com/media/ release.asp?newsID=478, Last Access Date : 03-12-2012.

Dobes, M. and Machala, L. (2010) Iris Database, http://www.inf.upol.cz/iris, Last Access Date : 03-12-2012.

http://www.answers.com/topic/image, Last Access Date : 30-12-2011.

http://www.ncd.matf. bg.ac.yu/casopis/05/Vuckovic/Vuckovic.pdf, Last Access Date : 30-12-2011.

http://www.photo-retouching.jaincotech.com/gallery_manipulation.htm, Last Access Date : January, 2012.

http://www.securitydocs.com/library/3461, Last Access Date : 30-12-2011.

Karen, C. (2003) The Technology of Rights: Digital Rights Management, http://www.kcoyle.net/drm_basics.pdf, Last Access Date : 30-12-2011.

Marek, S. (2004) Phones Click With Marketers, http://www.wirelessweek.com/article/CA457747.html?text=mobot&stt=001 Wireless Week, Last Access Date : 03-02-2012.

NTT Corporation (2003) NTT Develops CyberSquash Internet Access Platform using Electronic Watermarks, http://www.ntt.co.jp/news/news03e/0307/ 030707.html

Singh, R. (2001) Emerging technologies that will change the world: Digital Rights Management. MIT technology Review, www.technologyreview.com/ Infotech/12264, Last Access Date : 30-12-2011.

Yang, C.H (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution, Pattern Recognition, http://www.sciencedirect.com, Last Access Date : Feb 2012

Yang, C.N. (2010) Visual cryptography: An introduction to visual secret sharing schemes, Department of Computer Science and Information Engineering National Dong Hwa University Shoufeng, Taiwan, http://sna.csie.ndhu.edu.tw/~cnyang/vss/sld001.htm, Last Access Date : July, 2011.