A Discrete Cosine Transform (DCT) based Watermarking Scheme for Confidence Guarantee Image Transmission
Abstract
Keywords
Full Text:
PDFReferences
C.-T Hsu and J.-L.Wu, (1998) “Multiresolution watermarking for digital images,” IEEE Trans.Circuits Syst. II, vol. 45, pp. 1097–1101.
Blossom Kaur, Amandeep Kaur and Jasdeep Singh “Steganographic approach for hiding image in DCT domain” International Journal of Advances in Engineering & Technology, July 2011.
Xiaojun Qi and KokSheik Wong, (2005) “An Adaptive DCT-Based MOD-4 Steganography Method”, 0-7803-9134-9/05 IEEE.
LOU D.C., LIU J.L., LI C.-T.: „Digital Signature-Based Image Authentication‟, in LU C.S. (EDS.):„Multimedia security: steganography and digital watermarking techniques for protection of intellectual property‟ (Idea Group Inc., 2003).
Frank Hartung and Martin Kutter, “Multimedia WatermarkingTechniques” Proceedings of the IEEE, Vol. 87, No. 7, July 1999.
Gengming Zhu, and Nong Sang, (2008),” Watermarking Algorithm Research and Implementation Based on DCT Block”, World Academy of Science, Engineering and Technology 45.
Chiou-Ting Hsu and Ja-Ling Wu, "Hidden Digital Watermarks in Images" IEEE Transactions on Image Processing, Vol. 8, No.1, January 1999.
Combined DWT-DCT Digital Image Watermarking Ali Al-Haj Department of Computer Engineering, School of Electrical Engineering, Princess Sumaya University for Technology, POBox 1928, Al-Jubeiha, 11941 Amman, Jordan Journal of Computer Science 3 (9): 740-746, 2007 ISSN 1549-3636 ©2007 Science Publications.
Hidden Bits: A Survey of Techniques for Digital Watermarking Chris Shoemaker Independent Study EER-290 Prof. Rudko Spring 2002.
Frank Hartung and Martin Kutter, “Multimedia Watermarking Techniques” Proceedings of the IEEE, Vol. 87, No. 7, July 1999.
Eugene T. Lin and Edward J. Delp, "A Review of Fragile Image Watermarks" Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering Purdue University, West Lafayette, Indiana, USA.
Combined DWT-DCT Digital Image Watermarking Ali Al-Haj Department of Computer Engineering, School of Electrical Engineering, Princess Sumaya University for Technology, POBox 1928, Al-Jubeiha, 11941 Amman, Jordan Journal of Computer Science 3 (9): 740-746, 2007 ISSN 1549-3636 ©2007 Science Publications.
Aleena Devasia, Alina Menoth, Steape Monis, Maria George and Sneha Shivamkutty “A Survey on Watermarking of Images Using Hybrid Techniques” VESIT , International Technological Conference-2014 (I-TechCON), Jan. 03 – 04, 2014.
Johnson, N.F. &Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998.
“Reference guide: Graphics Technical Options and Decisions”, http://www.devx.com/projectcool/Article/1999.
Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002.
T. Morkel , J.H.P. Eloff , M.S. Olivier “An overview of image steganography‟.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.