Asian Journal of Information Technology
3182 - 3195
Attack Resistant Analysis Using Secure Singular Value Decomposition and Markov Random Field Based on Rotation Scaling Transformation Invariant Image Watermarking for Video Frames
Al-Taweel, S.A. and P. Suma, 2009. Robust video watermarking based on 3D-DWT domain. Proceeding of the IEEE, Conference on TENCON Region 10, January 23-26, 2009, IEEE, Singapore, ISBN: 978-1-4244-4546-2, pp: 1-6.
Bhatnagar, G. and B. Raman, 2012. Wavelet packet transform-based robust video watermarking technique. Sadhana, 37: 371-388.CrossRef | Direct Link |
Coria, L., P. Nasiopoulos, R. Ward and M. Pickering, 2007. An access control video watermarking method that is robust to geometric distortions. J. Inform. Assurance Secur., 2: 266-274.CrossRef |
Elbasi, E., 2007. Robust Video Watermarking Scheme. ProQuest, Ann Arbor, Michigan, USA., Pages: 193.
Fouda, Y.M., 2015. A robust template matching algorithm based on reducing dimensions. J. Signal Inf. Process., 6: 109-122.CrossRef | Direct Link |
Jayamalar, T. and V. Radha, 2010. Survey on digital video watermarking techniques and attacks on watermarks. Intl. J. Eng. Sci. Technol., 2: 6963-6967.
Lowe, D.G., 2004. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision, 60: 91-110.CrossRef | Direct Link |
Mirza, H.H., H.D. Thai, Y. Nagata and Z. Nakao, 2007. Digital video watermarking based on principal component analysis. Proceeding of the 2nd International IEEE Conference on Innovative Computing, Information and Control, September 5-7, 2007, IEEE, Kumamoto, Japan, ISBN: 0-7695-2882-1, pp: 290-290.
Mostafa, S.A.K., A.S. Tolb, F.M. Abdelkader and H.M. Elhindy, 2009. Video watermarking scheme based on principal component analysis and wavelet transform. Int. J. Comput. Sci. Network Security, 9: 45-52.Direct Link |
Park, H., S.H. Lee and Y.S. Moon, 2006. Adaptive Video Watermarking Utilizing Video Characteristics in 3D-DCT Domain. In: Digital Watermarking. Shi, Y.Q. and B. Jeon (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-48825-5, pp: 397.
Rubio, A. and J.A. Gamez, 2011. Flexible learning of k-dependence Bayesian network classifiers. Proceedings of the 13th Annual ACM Conference on Genetic and Evolutionary Computation, July 12-16, 2011, ACM, New York, USA., ISBN: 978-1-4503-0557-0, pp: 1219-1226.
Sajasi, S. and A.M.E. Moghadam, 2013. A high quality image hiding scheme based upon noise visibility function and an optimal chaotic based encryption method. Proceeding of the 5th RoboCup Iran Open International Symposium and 3rd Joint IEEE Conference on AI & Robotics and RIOS, April 8, 2013, IEEE, Tehran, Iran, pp: 1-7.
Seo, J.S. and C.D. Yoo, 2006. Image watermarking based on invariant regions of scale-space representation. IEEE Trans. Signal Process., 54: 1537-1549.CrossRef | Direct Link |
Wang, L., H. Ling, F. Zou and Z. Lu, 2011. Real-time compressed-domain video watermarking resistance to geometric distortions. IEEE. MultiMedia, 19: 70-79.Direct Link |
Yuan, X.C. and C.M. Pun, 2013. Feature based video watermarking resistant to geometric distortions. Proceeding of the 12th International IEEE Conference on Trust, Security and Privacy in Computing and Communications, July 16-18, 2013, IEEE, Melbourne, Victoria, Australia, pp: 763-767.
Zheng, D., S. Wang and J. Zhao, 2009. RST invariant image watermarking algorithm with mathematical modeling and analysis of the watermarking processes. Image Process. IEEE. Trans., 18: 1055-1068.CrossRef | PubMed | Direct Link |
Zheng, D., Y. Liu and J. Zhao, 2007. A survey of RST invariant image watermarking algorithms. ACM Comput. Surv., Vol. 39. 10.1145/1242471.1242473