Citation to this article as recorded by
Amirtharajan, R. and J.B.B. Rayappan, 2012. Pixel authorized by pixel to trace with SFC on image to sabotage data mugger: A comparative study on PI stego. Res. J. Inform. Technol., 4: 124-139. CrossRefDirect Link |
Elamaran, V., K. Narasimhan, P.V.M. Vijayabhaskar and G. Shiva, 2013. Comparison of wavelet filters in hybrid domain watermarking. Res. J. Infom. Technol., 5: 393-401. CrossRefDirect Link |
Jiang, M.F., 2012. A new adaptive visible watermarking algorithm for document images. Inform. Technol. J., 11: 1322-1326. CrossRef |
Citation to this article as recorded by
Video Watermarking Schemes Resistance Against Tampering Attacks 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME) |
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer Journal of Computer Networks and Communications |
An Analysis of 3D Steganography Techniques Electronics Vol. 10, Issue 19, 2357, 2021 |
Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking Advances in Information Security, Privacy, and Ethics |
Mazdak Technique for PSNR Estimation in Audio
Steganography Applied Mechanics and Materials |
How to cite this article
Akram M. Zeki, Azizah A. Manaf, Adamu A. Ibrahim and Mazdak Zamani, 2011. A Robust Watermark Embedding in Smooth Areas. Research Journal of Information Technology, 3: 123-131.
URL: https://scialert.net/abstract/?doi=rjit.2011.123.131
URL: https://scialert.net/abstract/?doi=rjit.2011.123.131