Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
23
Page No.
4820 - 4827
References
Anumol, T.J., V.A. Binson and S. Rasheed, 2013. FPGA implementation of low power, high speed, area efficient invisible image watermarking algorithm for images. Intl. J. Sci. Eng. Res., 4: 1-6.
Chitla, A. and M.C. Mohan, 2012. Authentication of images through lossless watermarking (LWM) technique with the aid of elliptic curve cryptography (ECC). Intl. J. Comput. Appl., 57: 17-25.
Direct Link | Devapriya, M. and K. Ramar, 2010. Statistical image watermarking in DWT with capacity improvement. Global J. Comput. Sci. Technol., 10: 20-24.
Direct Link | Gunjal, B.L., 2011. Wavelet based color image watermarking scheme giving high robustness and exact corelation. Intl. J. Emerging Trends Eng. Technol., 1: 21-30.
Gupta, P., 2012. Cryptography based digital image watermarking algorithm to increase security of watermark data. Int. J. Sci. Eng. Res., 3: 1-4.
Direct Link | Kundan, M., 2013. A new robust enrichment symmetric stream cipher approach for confidentiality based on rc4 stream cipher algorithm. Intl. J. Eng. Res. Technol., 2: 1-8.
Manikandan, R., M. Uma and S.M. MahalakshmiPreethi, 2012. Reversible data hiding for encrypted image. J. Comput. Appl., 5: 104-110.
Mousa, A. and A. Hamad, 2006. Evaluation of the RC4 Algorithm for Data Encryption. IJCSA., 3: 44-56.
Direct Link | Ni, Z., Y.Q. Shi, N. Ansari and W. Su, 2006. Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol., 16: 354-362.
CrossRef | Direct Link | Sandeep, K. and B. Rajiv, 2013. Enhanced technique for watermarking using MFHWT. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 1199-1202.
Umaamaheshvari, A. and K. Thanushkodi, 2012. A novel watermarking technique based on visual cryptography. Intl. J. Adv. Res. Comput. Eng. Technol., 1: 70-74.
Zhang, X., 2011. Reversible data hiding in encrypted image. IEEE Signal Process. Lett., 18: 255-258.
CrossRef | Direct Link | Zhang, X., 2012. Separable reversible data hiding in encrypted image. Trans. Inform. Forensics Secur., 7: 826-832.
CrossRef | Direct Link |