A new DCT based robust image watermarking scheme using cellular automata

[2]  Durgesh Singh,et al.  DCT based efficient fragile watermarking scheme for image authentication and restoration , 2015, Multimedia Tools and Applications.

[3]  Rabab Kreidieh Ward,et al.  Removing the blocking artifacts of block-based DCT compressed images , 2003, IEEE Trans. Image Process..

[4]  Yildiray Yalman,et al.  A New DCT Based Watermarking Method Using Luminance Component , 2013 .

[5]  Takeshi Koshiba,et al.  Blind Image Watermarking in Canonical and Cepstrum Domains Based on 4-Connected t-o'clock Scrambling , 2020, Symmetry.

[6]  C. Das,et al.  A novel blind robust image watermarking in DCT domain using inter-block coefficient correlation , 2014 .

[7]  Ashutosh Kumar Singh,et al.  Robust and distortion control dual watermarking in LWT domain using DCT and error correction code for color medical image , 2019, Multimedia Tools and Applications.

[9]  Shyamal Kumar Mondal,et al.  Partial reversible data hiding scheme using (7, 4) hamming code , 2017, Multimedia Tools and Applications.

[10]  Biswapati Jana,et al.  An Improved Data Hiding Scheme Through Image Interpolation , 2020 .

[11]  Nader Karimi,et al.  Blind image watermarking based on local analysis of gradients , 2017, 2017 Iranian Conference on Electrical Engineering (ICEE).

[12]  S M Ulam,et al.  Some ideas and prospects in biomathematics. , 1972, Annual review of biophysics and bioengineering.

[13]  Lu Liu,et al.  Fast digital watermarking algorithm based on cellular automata and multi-level texture synthesis , 2011, 2011 International Conference on Computer Science and Service System (CSSS).

[14]  Shih-Chieh Shie,et al.  Improving the robustness of DCT-based image watermarking against JPEG compression , 2005, 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE..

[15]  Amit Kumar Singh,et al.  Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine , 2014, Int. J. Electron. Secur. Digit. Forensics.

[16]  Nader Karimi,et al.  A hybrid DCT-SVD based image watermarking algorithm , 2016, 2016 24th Iranian Conference on Electrical Engineering (ICEE).

[17]  Bhupendra Verma,et al.  Digital image watermarking and its optimization using genetic algorithm , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[18]  Ruisong Ye,et al.  A Novel Image Scrambling and Watermarking Scheme Based on Cellular Automata , 2008, 2008 International Symposium on Electronic Commerce and Security.

[19]  Amit Kumar Singh,et al.  A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine , 2018, Multimedia Tools and Applications.

[20]  Ashok A. Ghatol,et al.  An enhancement in security and copyright protection technique used for digital still image , 2017, 2017 International Conference on Nascent Technologies in Engineering (ICNTE).

[21]  Amit Kumar Singh,et al.  SVD-DCT Based Medical Image Watermarking in NSCT Domain , 2018 .

[22]  Arashdeep Kaur,et al.  A secure and robust image watermarking system using wavelet domain , 2017, 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.

[23]  David B. Fogel,et al.  An introduction to simulated evolutionary optimization , 1994, IEEE Trans. Neural Networks.

[24]  Biswapati Jana,et al.  High payload reversible data hiding scheme using weighted matrix , 2016 .

[25]  Tadashi Kasezawa Blocking artifacts reduction using discrete cosine transform , 1997 .

[26]  Amit Kumar Singh,et al.  Hybrid Technique for Robust and Imperceptible Image Watermarking in DWT–DCT–SVD Domain , 2014, National Academy Science Letters.

[27]  Gaurav Gupta,et al.  An efficient DCT based image watermarking scheme for protecting distribution rights , 2015, 2015 Eighth International Conference on Contemporary Computing (IC3).

[28]  S. Wolfram Computation theory of cellular automata , 1984 .

[29]  Reena Gunjan,et al.  Secure Extraction of Image Data Based on Optimized Transform Method , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).