Biblio
“Image tamper detection and recovery based on dual watermarks sharing strategy”, Journal of Digital Information Management, vol. 10, no. 1, pp. 39 - 49, 2012.
, “A grayscale image steganography based upon discrete cosine transformation”, Journal of Digital Information Management, vol. 8, no. 2, pp. 88 - 94, 2010.
, “An image copyright protection scheme using DCT and a table look-up technique”, Journal of Digital Information Management, vol. 7, no. 6, pp. 358 - 364, 2009.
, “Reversible data embedding for color images”, Journal of Digital Information Management, vol. 6, no. 2, pp. 143 - 150, 2008.
,