Citations in impact factor journals
Steganography in discrete wavelet transform based on human visual system and cover model Multimedia Tools and Applications Vol. 78, Issue 13, 18475, 2019 |
Citation to this article as recorded by
Elamaran, V., K. Narasimhan, P.V.M. Vijayabhaskar and G. Shiva, 2013. Comparison of wavelet filters in hybrid domain watermarking. Res. J. Infom. Technol., 5: 393-401. CrossRefDirect Link |
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Wang Li, Gang Luo, Lingyun Xiang 2014. An Automatically Changing Feature Method based on Chaotic Encryption Inform. Technol. J., 13: 2404-2410. CrossRef |
Citation to this article as recorded by
Digital watermarking techniques for image security: a review Journal of Ambient Intelligence and Humanized Computing |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
Using Watermarking Techniques to prove Rightful Ownership of Web
Images International Journal of Information Technology and Web Engineering Vol. 6, Issue 2, 29, 2011 |
How to cite this article
Tzung-Her Chen, Gwoboa Horng and Sang-Hao Wang, 2003. A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model. Information Technology Journal, 2: 213-230.
DOI: 10.3923/itj.2003.213.230
URL: https://scialert.net/abstract/?doi=itj.2003.213.230
DOI: 10.3923/itj.2003.213.230
URL: https://scialert.net/abstract/?doi=itj.2003.213.230