1. [1] Information Hiding and its Criteria for evaluation, https://www.ieice.org/iss/emm/ihc/en/image/image.php (20th February, 2023 access)
2. [2] H. Luo, X. Sun, H. Yang, and Z. Xia, “A Robust Image Watermarking Based on Image Restoration Using SIFT,” Radioengineering, vol.20, no.2, pp.525-532, 2011.
3. [3] L.-D. Li, B.-L Guo, and J.-S. Pan, “Feature-Based Image Watermarking Resisting Geometric Attacks,” 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, Liaoning, p.18, 2008. 10.1109/icicic.2008.280
4. [4] M. Begum, J. Ferdush, and M.S. Uddin, “A Hybrid robust watermarking system based on discrete cosine transform, discrete wavelet transform, and singular value decomposition,” J. King Saud Univ. Sci., vol.34, no.8, part B, pp.5856-5867, 2022. 10.1016/j.jksuci.2021.07.012
5. [5] D.G. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” International J. Compute Vision, vol.60, no.2, pp.91-110, 2004. 10.1023/b:visi.0000029664.99615.94