Volume 3 | Issue 2 | Year 2012 | Article Id. IJMTT-V3I2P509 | DOI : https://doi.org/10.14445/22315373/IJMTT-V3I2P509
Dr.A.S.N. Chakravarthy, Prof.S.BALAJI, Rammohanarao Koduri, "Evaluation of Watermarking Techniques," International Journal of Mathematics Trends and Technology (IJMTT), vol. 3, no. 2, pp. 82-85, 2012. Crossref, https://doi.org/10.14445/22315373/IJMTT-V3I2P509
[1] Jiri Fridrich* a,b, Miroslay Goljan Center for Intelligent Systems, SUNNY Binghamton, Binghamton, NY 13902-6000, Mission Research corporation, 1720 Randolph Rd SE, Albuquerque, NM 87106.
[2] Y. Yang, F. Bao and R.H. Deng, “Flexible authentication of images”, in Proc. of the SPIE, Visual Communications and Image Processing 2003.Edited by Ebrahimi, Touradj; Sikora, Thomas. vol. 5150, pp. 1905-1911, 2003.
[3] M.S. Hwang, C.C. Chang, and K.F. Hwang, “A watermarking technique based on one-way hash functions”, IEEE Transactions on Consumer Electronics, vol. 45, no. 2, pp. 286-294, May 1999.
[4] C. Candan, “A multiple description coding scheme based on the Chinese remainder theorem”, in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 4, May 2002, pp. IV-3525 – IV-3528.
[5] C.C. Chang, P. Tsai and C.C. Lin, “SVD-based digital image watermarking scheme”, Pattern Recognition Letters, vol. 26, pp. 1577- 1586, 2005.
[6] C. Bornand HEIG-VD, Yverdon-les-Bains University of Applied Sciences, Switzerland 2008 IEEE International Conference on Systems, Ma n and Cybern etics (SMC 2008)
[7] Vidyasagar M. Potdar, Song Han, Elizabeth Chang School of Information Systems, Curtin University of Technology, Perth, Western Australiahttp://www.petitcolas.net/fabien/watermarking/stinnark
[8] Cryptography and Information Security Maiko Kobe, Japan, Jan. 25-28, 2005 The Institute of Electronics, Information and Communication Engineers
[9] H. Garner, “The residue number system”, IRE Transactions on Electronic Computers, EC-8, pp. 140–147, 1959.
[10] Chiou, C.W and Yang, T.C. (1994):” Iterative Modular Multiplication algorithm without Magnitude Comparison,” Electronic letters. Vol. 30, No. 24, Nov. 94, pp 2017-2018.
[11] Hasted, j. (1985):”On Using RSA with low exponent in a public key Network,” Proc. Of CRYPTO-85, Springer-verlag, New York, 1986, pp. 403-408.