[1] Chun-Shien Lu , Multimedia security: steganography and digital watermarking techniques for protection of intellectual property , Idea Group Publishing.
[2] F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn, “Information Hiding—A Survey,” Proc. IEEE, vol. 87, no. 7, 1999, pp. 1062–1078.
[3] Cox , I.J. , Miller , M.L. , & Bloom , J.A. (2002). Digital watermarking (1st ed.). San Francisco: Morgan Kaufmann.
[4] J. Seitz, Digital watermarking for digital media, Information Science Publishing, 2005.
[5] A. Ker, “Improved detection of LSB steganography in grayscale images,” in Proc. Information Hiding Workshop, vol. 3200, Springer LNCS, 2004, pp. 97–115.
[6] J.Mielikainen, “LSB matching Revisited”, IEEE signal processing letters, Vol. 13, No. 5, May 2006.
[7] B. Chen and G. Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
[8] J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, “Scalar costa scheme for information embedding, ” IEEE Trans. Signal Process., vol. 4, no. 51, pp. 1003-1019, Apr. 2003.
[9] Q. Zhang, and N. Boston, “Quantization index modulation using E8 lattice”, in Proc. 41th Annual Allerton Conf. on Communication, Control and Computing, Allerton, IL, USA, 2003.
[10] I. K. Yeo and H. J. Kim, “Modified patchwork algorithm: A novel audio watermarking scheme,” IEEE Trans. Speech Audio Process., vol. 11, no. 4, pp. 381–386, Jul. 2003.
[11] I. K. Yeo, H. J. Kim “Generalized patchwork algorithm for image watermarking,” Multimedia Syst. vol. 9, no. 3, pp. 261-265, 2003
[12] J. J. Eggers, R. Bauml, and B. Girod, “Estimation of amplitude modifications before SCS watermark detection,” in Proc. SPIE Security Multimedia Content P. W. Wong and E. J. Delp, Eds. San Jose, CA, Jan. 2002, vol. 4675, pp. 387-398.
[13] J. H. Conway and N. J. A. Sloane, Sphere Packing, Lattices, and Groups. New York: Springer-Verlag, 1998.
[14] M. L. Miller, G. J. Doerr, and I. J. Cox, “Applying informed coding and embedding to design robust, high capacity, watermark,” IEEE Trans. Image Process., vol. 13, no. 16, pp. 792-807, June, 2004.
[15] C. Chen, and X. Wu, “An angel QIM watermarking based on Watson perceptual model,” in Proc. International Conference on Image and Graphics, Chengdu, Sichuan, China, 2007.
[16] F. Ourique, and F. Perez-Gonzalez, “Angel QIM: A novel watermarking embedding scheme robust against amplitude scaling distortion,” in Proc. ICASSP 2005, vol. II, pp.797-800, 2005.
[17] F. Perz-Gonzalez, C. Mosquera, M. Barni, and A. Abrado, “Rational dither modulation: A high rate data-hiding method invariant to gain attacks,” IEEE Trams. Signal Process. vol. 53, no. 10, pp. 3960-3975, Oct. 2005.
[18] Z. Wang and A.C. Bovik, “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Trans. on Image Process., vol. 13, no. 4, pp. 600–612, 2004.
[19] Z. Wang and A.C. Bovik, “A universal image quality index,” IEEE Signal Processing Letters, vol. 9, no. 3, pp. 81–84, 2002.
[20] M. A. Akhaee, S. M. E. Sahraeian, B. Sankur, and F. Marvasti, “Robust Scaling Based Image Watermarking Using Maximum Likelihood Decoder with Optimum Strength Factor,” IEEE Trans. on Multimedia, vol. 11, no.4, pp. 431-444, Aug, 2009.
[21] Gembicki , F. , and Haimes , Y.: `Approach to performance and sensitivity multiob-jective optimization: The goal attainment method' , IEEE Transactions on Automatic Control , 1975 , 20 , (6) , pp. 769-771.
[22] Y. Wang, J.F. Doherty, and R.E. Van Dyck, “A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images,” IEEE Transactions on Image Processing, vol. 11, no. 2, pp. 77–88, 2002.