[1] Jain A.K and Uludag U., “Hiding Biometric Data,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 25, NO. 11, pp.
1494-1498, November 2003.
[2] [2] Pankanti S. and Yeung M.M., “Verification Watermarks on
fingerprint Recognition and Retrieval,” Proc. SPIE, vol. 3657, pp.66-78,
1999.
[3] [3] A.K. Jain, K.Nandakumar, and A.Nager, “Biometric Template
Security,” EURASIP Journal on Advances in Signal Processing, 2008,
pp. 1-17.
[4] [4] B.Gunsel, U.Uludaga and A.M. Tekalp, “Robust Watermarking of
Fingerprint Images,” Pattern Recognition, 35(12), 2002, pp. 2739-2747.
[5] [5] D. Kundur and D.Hatzinakos, “Digital Watermarking Using
Multiresolution Wavelet Decomposition,” International conference on
acoustic Speech and Signal Processing (ICASSP), Seattle, May.1999,
pp. 2969-2972.
[6] [6] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding – A
survey,” Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
[7] [7] Salah M. Rahal, Hatim A. Aboalssamh, Khalid N. Muteb,”
Multimodal Biometric Authentication System – MBAS,” 2nd IEEE
International Conf. On Communication & Technologies, April 24-28,
2006 Damascus, Syria.
[8] [8] A.K. Jain and U. Uludag, “Hiding Fingerprint Minutiae in
Images,” Proc. International Conference on Pattern Recognition, 3(3),
2002, pp. 756-759.
[9] [9] A. Abu-EErrub, A. Al-Haj, “Optimized DWT Based Image
Watermarking,” IEEE, 2008
[10] [10] J. Delaigle, C. De Vleeschouwer, B. Macq, “Psychovisual
Approach to Digital Picture Watermarking,” Journal of Electronic
Imaging, vol. 7, no. 3, pp. 628-640, 1998.
[11] [11] R.C. Gonzalez, R.E. Woods, Digital Image Processing, New
Jersey: Prentice Hall, Upper Saddle River, 2002.
[12] [12] C. V. Serdean, M. Tomlinson, J. Wade, A.M. Ambroze,
“Protecting Intellectual Rights: Digital Watermarking in the wavelet
domain,” IEEE Int. Workshop Trends and Recent Achievements in IT,
pp. 16-18, 2002.
[13] [13] R.safarbakhsh, S.zzaboli, A. Tabibiazar, “Digital Watermarking on
Still Images Using Wavelet Transform,” in Proc. International
Conference on Information Technology: Coding and Computing
ITCC’04,IEEE, 2004.
[14] [14] A. Graphs, “An Introduction to Wavelets,” IEEE Computational
Science and Engineering, vol. 2, no. 2, pp.50-61, 1995.
[15] [15] B.Furht, D. Kirovski, “Encryption and Authentications:
Techniques and Applications,” USA: Auerbach, 2006
[16] [16] R. K Chhotaray. K.B Shiva Kumar, K. B Raja and Sabyasachi
Pattanaik, “Bit length replacement steganography based on dct
coefficients,” International Journal of Engineering Science and
Technology, 2:3561-3570, 2010.
[17] [17] Chia-chen Lin, “High capacity data hiding scheme for dct-based
images,” Journal of Information Hiding and Multimeda Signal
Processing, 2010.
[18] [18] Ajit Danti and Preethi Acharya, “Randomized embedding scheme
based on dct coefficients for image steganography,” IJCA Special Issue
on Recent Trends in Image Processing and Pattern Recognition, 2010
Thank you for copying data from http://www.arastirmax.com