Author:
Sivakannan S.,Thirugnanam G.,Mangaiyarkarasi P.
Reference12 articles.
1. Al-Otum, H.: Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique. J. Vis. Commun. Image Represent. 25(5), 1064–1081 (2014)
2. Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for watermarking digital images. J. Mach. Learn. Res. 4, 1471–1498 (2003)
3. Hajisami, A., Hosseini, S.: Application of ICA in watermarking. In: Gupta, M.D., (ed) Watermarking, vol. 1. InTech (2012)
4. Rao, N., Thrimurthy, P., Babu, B.: A novel scheme for digital rights management of images using biometrics. Int. J. Comput. Sci. Netw. Security 9(3), 157–167 (2009)
5. Giakoumaki, A., Pavlopoulos, S., Koutsouris, D.: Multiple image watermarking applied to health information management. IEEE Trans. Inf. Technol. Biomed. 10(4), 722–732 (2006)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Survey on Different Techniques of Medical Image Watermarking to Ascertain Authenticity and Ownership;2023 International Conference on Computational Intelligence, Communication Technology and Networking (CICTN);2023-04-20