Venkatesan et al., 2007
| Publication | Publication Date | Title |
|---|---|---|
| Haghighi et al. | TRLH: Fragile and blind dual watermarking for image tamper detection and self-recovery based on lifting wavelet transform and halftoning technique | |
| Fridrich et al. | Further attacks on Yeung-Mintzer fragile watermarking scheme | |
| US7020303B2 (en) | Feature-based watermarks and watermark detection strategies | |
| Kuo et al. | Reversible data hiding based on histogram | |
| EP1566763B1 (en) | Watermarking of limited colour images | |
| Kuo et al. | A reversible data hiding scheme based on block division | |
| Wu et al. | A high capacity reversible data hiding scheme with edge prediction and difference expansion | |
| Venkatesan et al. | A new data hiding scheme with quality control for binary images using block parity | |
| Kurup et al. | Data hiding scheme based on octagon shaped shell | |
| Munir | A secure fragile video watermarking algorithm for content authentication based on arnold CAT map | |
| Surekha et al. | A multiple watermarking technique for images based on visual cryptography | |
| KR100792984B1 (en) | Information Insertion and Extraction Method for Image Authentication | |
| Sonnleitner | A robust watermarking approach for large databases | |
| Surekha et al. | A watermarking technique based on visual cryptography | |
| Wu et al. | A secure image authentication algorithm with pixel-level tamper localization | |
| Mondal et al. | Spatial domain robust watermarking scheme for color image | |
| Hsu et al. | Visible watermarking with reversibility of multimedia images for ownership declarations | |
| Jung | Data hiding of digital images based on bit position and parity bit | |
| Jasmine Selvakumari Jeya et al. | RONI based secured and authenticated indexing of lung CT images | |
| Bhadra et al. | A novel piracy protection scheme for videos using force-induced pixels | |
| Hasan et al. | Fragile blockwise image authentication thwarting vector quantization attack | |
| Ajetrao et al. | A novel scheme of data hiding in binary images | |
| Punitha et al. | Notice of Violation of IEEE Publication Principles: Binary watermarking technique based on Visual Cryptography | |
| Shukla et al. | An Efficient Self-embedding Fragile Watermarking Scheme Based on Neighborhood Relationship | |
| Puhan et al. | Secure tamper localization in binary document image authentication |