[Avci, E., Tuncer, T. and Avci, D. (2016). A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain, Arabian Journal for Science and Engineering41(8): 3153–3161, DOI: 10.1007/s13369-016-2124-4.10.1007/s13369-016-2124-4]Search in Google Scholar
[Bao, L. and Zhou, Y. (2015). Image encryption: Generating visually meaningful encrypted images, Information Sciences324: 197–207.10.1016/j.ins.2015.06.049]Search in Google Scholar
[Chai, X., Gan, Z., Chen, Y. and Zhang, Y. (2017). A visually secure image encryption scheme based on compressive sensing, Signal Processing134: 35–51.10.1016/j.sigpro.2016.11.016]Search in Google Scholar
[Chang, C.-C., Lin, C.-C. and Chen, Y.-H. (2008). Reversible data-embedding scheme using differences between original and predicted pixel values, IET Information Security2(2): 35–46.10.1049/iet-ifs:20070004]Search in Google Scholar
[Chen, B., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.L. and Shu, H. (2014). Full 4-d quaternion discrete Fourier transform based watermarking for color images, Digital Signal Processing28: 106–119.10.1016/j.dsp.2014.02.010]Search in Google Scholar
[Chen, G., Mao, Y. and Chui, C.K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps, Chaos, Solitons & Fractals21(3): 749–761.10.1016/j.chaos.2003.12.022]Search in Google Scholar
[Dhall, S., Pal, S. K. and Sharma, K. (2018). Cryptanalysis of image encryption scheme based on a new 1d chaotic system, Signal Processing146: 22–32.10.1016/j.sigpro.2017.12.021]Search in Google Scholar
[Faragallah, O.S. (2013). Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain, International Journal of Electronics and Communications67(3): 189–196.10.1016/j.aeue.2012.07.010]Search in Google Scholar
[Ghebleh, M., Kanso, A. and Noura, H. (2014). An image encryption scheme based on irregularly decimated chaotic maps, Signal Processing: Image Communication29(5): 618–627.10.1016/j.image.2013.09.009]Search in Google Scholar
[Kanso, A. and Ghebleh, M. (2017). An algorithm for encryption of secret images into meaningful images, Optics and Lasers in Engineering90: 196–208.10.1016/j.optlaseng.2016.10.009]Search in Google Scholar
[Lee, S.-H. (2014). DWT based coding DNA watermarking for DNA copyright protection, Information Sciences273: 263–286.10.1016/j.ins.2014.03.039]Search in Google Scholar
[Liu, F. and Wu, C. (2011). Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners, IET Information Security5(2): 121–128.10.1049/iet-ifs.2009.0183]Search in Google Scholar
[Peng, F., Li, X. and Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform, Signal Processing92(1): 54 – 62.10.1016/j.sigpro.2011.06.006]Search in Google Scholar
[Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2017). A robust semi-blind watermarking for color images based on multiple decompositions, Multimedia Tools and Applications76(24): 25623–25656, DOI: 10.1007/s11042-017-4355-0.10.1007/s11042-017-4355-0]Open DOISearch in Google Scholar
[Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2018). Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation, Multimedia Tools and Applications77(5): 5609–5635, DOI: 10.1007/s11042-017-4476-5.10.1007/s11042-017-4476-5]Open DOISearch in Google Scholar
[Sun, S. (2016). A novel edge based image steganography with 2k correction and Huffman encoding, Information Processing Letters116(2): 93–99.10.1016/j.ipl.2015.09.016]Search in Google Scholar
[Tanchenko, A. (2014). Visual-PSNR measure of image quality, Journal of Visual Communication and Image Representation25(5): 874–878.10.1016/j.jvcir.2014.01.008]Search in Google Scholar
[Tuncer, T. and Avci, E. (2016). A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays41: 1–8.10.1016/j.displa.2015.10.005]Search in Google Scholar
[Yang, Y.-G., Zhang, Y.-C., Chen, X.-B., Zhou, Y.-H. and Shi, W.-M. (2018). Eliminating the texture features in visually meaningful cipher images, Information Sciences429: 102–119.10.1016/j.ins.2017.11.009]Search in Google Scholar