Citations (74) J2 (12) Journal publications (9) 1. Skubalska-Rafajłowicz, E., “Estimation of horizontal and vertical translations of large images based on columns and rows mean energy matching”, Multidimensional Systems and Signal Processing, Vol. 25, Issue 2, pp. 273-294, 2014. http://link.springer.com/article/10.1007%2Fs11045-013-0247-2 , Ref. [28] 2. Sudeepa, D.R.S., Hema, R., Jaiseeli, C., “Estimation of scene flow based on the warping theory”, International Journal of Applied Engineering Research, Vol. 9, Issue 11, pp. 15411549, 2014. http://www.scopus.com/record/display.url?eid=2-s2.084901008724&origin=resultslist&sort=plff&src=s&st1=karybali&sid=8C3170757F9384FF867E2BDC1BF1E6F3.aqHV0EoE4xlIF3hgV WgA%3a120&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1&citeCnt=0 &searchTerm=ALL%28karybali%29 , Ref. [18] 3. Tryggestad E., Flammang A., Hales R., Herman J., Lee J., McNutt T., Roland T., Shea S.M., Wong J., “4D tumor centroid tracking using orthogonal 2D dynamic MRI: Implications for radiotherapy planning”, Medical Physics, Vol. 40, Issue 9, Art. No. 091712, Sept. 2013. http://www.scopus.com/record/display.url?eid=2-s2.084883791397&origin=resultslist&sort=plff&src=s&st1=karybali&sid=BD6A8F7E29A8565CC3F1A3148273DB2F.y7ESLndDIsN8cE7q wvy6w%3a20&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1&citeCnt=0 &searchTerm=ALL%28karybali%29 , Ref. [39] 4. Dong Won Yang, Do Jong Kim, “A fast and efficient image registration algorithm using outlier rejection technique based on subimage”, International Journal of Control, Automation and Systems, Springer, Vol.11, Issue 4, pp. 790-797, Aug. 2013. http://link.springer.com/content/pdf/10.1007%2Fs12555-011-8114-0.pdf , Ref. [21] 5. Ewa Skubalska-Rafajlowicz, “Estimation of horizontal and vertical translations of large images based on columns and rows mean energy matching”, Multidimensional Systems and Signal Processing, Springer, Aug. 2013. DOI 10.1007_s11045-013-0247-2 http://link.springer.com/content/pdf/10.1007%2Fs11045-013-0247-2.pdf , Ref. [28] 6. Hao Lu, Tuanjie Liu, Haiqing Zhao, “High-accuracy band to band registration method for multispectral images of HJ-1A/B”, Journal of Electronics (China), Vol. 29, Issue 5, pp. 361-367, Sep. 2012. http://link.springer.com/article/10.1007%2Fs11767-012-0875-y , Ref. [4] 7. Pelletier S. Cooperstock J.R., “Preconditioning for edge-preserving image super resolution”, IEEE Transactions on Image Processing, Vol. 21, No. 1, pp. 67-79, Jan. 2012. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5898412 , Ref. [28] 8. Chen Z., Yin F., Sun F., “Registration technique for high-resolution remote sensing images based on nonsubsampled contourlet transform”, Guangxue Xuebao/Acta Optica Sinica Vol. 29, No. 10, pp. 2744-2750, Oct. 2009. http://www.scopus.com/record/display.url?eid=2-s2.070449404882&origin=resultslist&sort=plf-f&cite=2-s2.01 54049119146&src=s&imp=t&sid=UVFDBRm6wL4l21Q7RU4HxKg%3a90&sot=cite&sdt=a& sl=0&relpos=0&relpos=0 , Ref. [2] 9. Jialing Wang and Paul A. Lang, “Detection of Cypress Canopies in the Florida Panhandle Using Subpixel Analysis and GIS”, Remote Sensing, Vol. 1, Issue 4, pp. 1028-1042, Dec. 2009. http://www.mdpi.com/2072-4292/1/4/1028/ , Ref. [41] Remote Sensing (ISSN 2072-4292), an Open Access journal of the science and technology of remote sensing and the applications, is published by Molecular Diversity Preservation International (MDPI) online monthly. Conference publications (2) 1. Stankevich S.A., Shklyar S.V. and Tyagur V.M., “Subpixel resolution satellite imaging technique”, Proceedings – IEEE International Conference on Digital Technologies (DT), pp. 5558, 2013. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6566286 , Ref. [1] 2. Misganu Debella-Gilo and Andreas Kääb, “Sub-pixel precision image matching for displacement measurement of mass movements using normalised cross-correlation”, Proceedings – ISPRS (International Society for Photogrammetry and Remote Sensing) TC VII Symposium, IAPRS, Vol. XXXVIII, Part 7B, 2010. http://www.isprs.org/proceedings/XXXVIII/part7/b/pdf/181_XXXVIII-part7B.pdf MSc and PhD theses (1) 1. Stéphane Pelletier, “Acceleration methods for image super-resolution”, PhD Thesis, Department of Electrical & Computer Engineering, McGill University, Montréal, Canada, 2009. http://www.cim.mcgill.ca/sre/publications/thesis/2009-PHD-Pelletier.pdf , Ref. [164] J1 (52) Books and book chapters (5) 1. Tadeusz Michałowski, “Applications of MATLAB in Science and Engineering”, InTech, 2011, ISBN: 978-953-307-708-6. Chapter 22 – Novel Variance Based Spatial Domain Watermarking and its’ Comparison with DIMA and DCT Based Watermarking Counterparts, pp. 452-468, Ref. [15]. http://www.intechopen.com/articles/show/title/novel-variance-based-spatial-domainwatermarking-and-its-comparison-with-dima-and-dct-based-watermar 2. F. Shih, “Image Processing and Pattern Recognition: Fundamentals and Techniques”, WileyIEEE Press, 2010, ISBN: 9780470590416. Chapter 12 – Image Watermarking, pp.444-473. http://ieeexplore.ieee.org/xpl/ebooks/bookPdfWithBanner.jsp?fileName=5559029.pdf&bkn=555 9001 3. Alan C. Bovik, “The Essential Guide to Image Processing”, Academic Press, 2009, ISBN-10: 0123744571, ISBN-13: 978-0123744579. Chapter 22 – Image Watermarking: Techniques and Applications, pp. 597-648, Ref. [114]. http://www.amazon.com/Essential-Guide-ImageProcessing/dp/0123744571/ref=sr_1_1?ie=UTF8&s=books&qid=1256815328&sr=11#reader_0123744571 4. Ahmed Bouridane, “Imaging for Forensics and Security: From Theory to Practice”, Springer, 2009, ISBN-10: 0387095314, ISBN-13: 978-0387095318, 2 Chapter 6 – Protection of Fingerprint Data Using Watermarking, pp.117-142, Ref. [7]. http://www.amazon.com/Imaging-Forensics-Security-CommunicationTechnology/dp/0387095314/ref=sr_1_1?ie=UTF8&s=books&qid=1256816201&sr=11#reader_0387095314 5. Chang-Tsun Li, Multimedia Forensics and Security, IGI Global, 2008, ISBN-10: 1599048698, ISBN-13: 978-1599048697 Chapter VII – Statistical Watermark Detection in the Transform Domain for Digital Images http://books.google.gr/books?id=A1D61snlvcC&pg=PA138&lpg=PA138&dq=karybali&source=web&ots=ZAR8SZHlcV&sig=CfTBX deDu_svSjRiVo7ODBh6d-E&hl=el&sa=X&oi=book_result&resnum=9&ct=result#PPA139,M1 Journal publications (24) 1. Alam, M.M., Vilankar, K.P., Field, D.J., Chandler, D.M., “Local masking in natural images: A database and analysis”, Journal of Vision, Vol. 14, Issue 8, Article no. 22, pp.1-38, 2014. http://www.journalofvision.org/content/14/8/22.full.pdf+html , Ref. [56] 2. H.Y. Leung, L.M. Cheng, F. Liu and Q.K. Fu, “Adaptive reversible data hiding on block median preservation and modification of prediction errors”, Journal of Systems and Software, Elsevier, Vol. 86, Issue 8, pp. 2204-2219, Aug. 2013. http://www.sciencedirect.com/science/article/pii/S0164121213000903 , Ref. [12] 3. Damon M. Chandler, “Seven Challenges in Image Quality Assessment: Past, Present, and Future Research,” ISRN Signal Processing, vol. 2013, Article ID 905685, 53 pages, 2013. doi:10.1155/2013/905685 http://www.hindawi.com/isrn/signal.processing/2013/905685/ , Ref. [6] 4. Narong Mettripun, Thumrongrat Amornraksa and Edward J. Delp, “Robust image watermarking based on luminance modification”, Journal of Electronic Imaging, SPIE, Vol. 22, Issue 3, 2013. doi:10.1117/1.JEI.22.3.033009 http://electronicimaging.spiedigitallibrary.org/article.aspx?articleid=1727060 , Ref. [17] 5. Wang D., Li Y., Nian G.-J. and Wang K., “An inhomogeneity mask for spatial watermarking”, Jilin Daxue Xuebao (Gongxueban) / Journal of Jilin University (Engineering and Technology Edition) Vol. 43, Issue 3, pp. 771-775, May 2013. http://www.scopus.com/record/display.url?eid=2-s2.084880986376&origin=resultslist&sort=plff&src=s&st1=karybali&sid=2FF8F68786F048FC27C216592CDDC1B0.WlW7NKKC52nnQNx jqAQrlA%3a20&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1&citeCnt= 0&searchTerm=ALL%28karybali%29 , Ref. [2] 6. Mohammad Imroze Khan, Samiksha Soni, Bibhudendra Acharya, Shrish Verma, “Implementation of digital watermarking using VHDL”, International Journal of Computer Science & Communication, Vol. 3, No. 1, pp. 15-21, 2012. http://www.csjournals.com/IJCSC/PDF3-2/Article_3.pdf , Ref. [8] 7. Amir Valizadeh and Z Jane Wang, “Efficient blind decoders for additive spread spectrum embedding based data hiding”, Eurasip Journal on Advances in Signal Processing (Open Access), 2012:88 http://link.springer.com/article/10.1186%2F1687-6180-2012-88?LI=true#page-1 , Ref. [24] 3 8. Vahedi E., Zoroofi R.A., Shiva M., “Toward a new wavelet-based watermarking approach for color images using bio-inspired optimization principles”, Digital Signal Processing, Elsevier, Vol. 22, No.1, pp. 153-162, Jan. 2012. http://www.sciencedirect.com/science/article/pii/S1051200411001485 , Ref. [5] 9. Zhang F., Liu W., Lin W., Ngan K.N., “Spread spectrum image watermarking based on perceptual quality metric”, IEEE Transactions on Image Processing, Vol. 20, No. 11, pp. 32073218, Nov. 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5754586 , Ref.[15] 10. Fakhari P., Vahedi E., Lucas C., “Protecting patient privacy from unauthorized release of medical images using a bio-inspired wavelet-based watermarking approach”, Digital Signal Processing, Elsevier, Vol.21, No. 3, pp. 433-446, May 2011. http://www.sciencedirect.com/science/article/pii/S1051200411000170 , Ref. [17] 11. Nian G.-J., Liu H.-S., “Data hiding in colour image applied in certificate verification”, International Journal of Multimedia Intelligence and Security, Inderscience Enterprises Ltd, Vol. 2, No. 2, pp. 186-198, 2011. http://inderscience.metapress.com/content/61k472603t73451l/ 12. Nian G.-J., Liu H.-S., Wang D., Wang N.-D., “Analysis and realization of watermarking hiding in color picture”, Jilin Daxue Xuebao (Gongxueban) / Journal of Jilin University (Engineering and Technology Edition) Vol. 41, Issue SUPPL. 1, pp. 339-343, Jul. 2011. http://www.scopus.com/record/display.url?eid=2-s2.080053531197&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=6YQjC1UPLhd1lOsvIf4bYa%3a30&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=8&relpo s=8&searchTerm=ALL%28karybali%29 , Ref.[9] 13.Nian G.-J., Liu H.-S., Che X.-L., Sun X.-Y., “Prediction error filter applied in blind additive watermarking algorithm”, Jilin Daxue Xuebao (Gongxueban) / Journal of Jilin University (Engineering and Technology Edition), Vol. 41, No. 1, pp.249-253, Jan. 2011. http://www.scopus.com/record/display.url?eid=2-s2.079951779030&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=OWi-YidWJmk9eEPpjzQ1_n%3a00&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=1&relpos=1 &searchTerm=ALL%28karybali%29 , Ref. [7] 14. Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee, “Digital Cinema Watermarking for Estimating the Position of the Pirate”, IEEE Transactions on Multimedia, Vol. 12, No. 7, pp. 605 - 621, Nov. 2010. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5540297 , Ref. [20] 15. Kalantari N. K., Ahadi S. M., Vafadust M., “A robust image watermarking in the ridgelet domain using universally optimum decoder”, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 20, No. 3, pp. 396-406, Mar. 2010. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5308358 , Ref. [2] 16. Oh T.-W., Lee M.-J., Kim K.-S., Lee H.-K., “Robust high-definition video watermarking based on self-synchronizing signals against composite distortions”, Optical Engineering, SPIE, Vol. 49, No. 9, art. no. 097006, Sep. 2010. http://www.scopus.com/record/display.url?eid=2-s2.081355132645&origin=resultslist&sort=plff&src=s&st1=karybali&sid=AzLVYQyZB93wAlryNz_B91a%3a30&sot=b&sdt=b&sl=13&s= ALL%28karybali%29&relpos=15&relpos=15&searchTerm=ALL%28karybali%29 , Ref. [19] 17. Min-Jeong Lee, Kyung-Su Kim, Tae-Woo Oh, Hae-Yeoun Lee and Heung-Kyu Lee, “Improved watermark synchronization based on local autocorrelation function”, Journal of Electronic Imaging, SPIE, Vol. 18, No. 2, art. no. 023008, May 2009. 4 http://www.scopus.com/record/display.url?eid=2-s2.078149254459&origin=resultslist&sort=plff&src=s&st1=karybali&sid=PoY4fLdHaOPRHkVxCZlXFqF%3a60&sot=b&sdt=b&sl=13&s= ALL%28karybali%29&relpos=19&relpos=19&searchTerm=ALL%28karybali%29 , Ref. [19] 18. Liu K.-C., Chou C.-H., “Robust and transparent watermarking scheme for colour images”, IET Image Processing, Vol. 3, No. 4, pp. 228-242, 2009. http://www.scopus.com/record/display.url?view=basic&eid=2-s2.069149091825&origin=resultslist&sort=plf-f&cite=2-s2.0-69149091825&refeid=2-s2.033744722467&src=s&imp=t&sid=qWB0e4Kq27ArV3fxwjNnZG%3a110&sot=cite&sdt=a&sl=0&relpos=0&relpos=0 , Ref. [3] 19. Damon Chandler, Matthew Gaubatz and Sheila S. Hemami, “A Patch-Based Structural Masking Model with an Application to Compression”, Eurasip Journal on Image and Video Processing, Art. ID: 649316, 22 pages, 2009. http://www.hindawi.com/journals/ivp/aip.649316.html Ref. [7] 20. Jin W., Li J.-X., Yin C.-Q., “An image zero-watermarking scheme based on visual cryptography utilizing contour-wavelet”, Guangdianzi Jiguang/Journal of Optoelectronics Laser, Vol. 20, No. 5, pp. 653-656, May 2009. http://www.scopus.com/record/display.url?view=basic&eid=2-s2.066349103473&origin=resultslist&sort=plf-f&cite=2-s2.0-69149091825&refeid=2-s2.033744722467&src=s&imp=t&sid=qWB0e4Kq27ArV3fxwjNnZG%3a110&sot=cite&sdt=a&sl=0&relpos=2&relpos=2, Ref. [1] 21. Kyung-Su Kim, Hae-Yeoun Lee, Dong-Hyuck Im and Heung-Kyu Lee, “Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents”, IEICE Transactions on Information and Systems, E91-D, No. 5, pp. 1359-1368, 2008. http://www.jstage.jst.go.jp/article/transinf/E91.D/5/E91.D_1359/_cit , Ref. [19] 22. Khalil Zebbiche, F. Khelifi, and Ahmed Bouridane, “An Efficient watermarking Technique for the Protection of Fingerprint Images”, Eurasip Journal on Information Security, Art. ID: 918601, 20 pages, 2008. http://www.hindawi.com/journals/is/aip.918601.html Ref. [7] 23. J. Zhong and S. Huang, “Double Sided Watermark Embedding and Detection with Perceptual Analysis”, ArXiv e-prints, Vol. 705, 0705.1925, 2007. http://arxiv.org/ftp/arxiv/papers/0705/0705.1925.pdf , Ref. [11] 24. Chen Kailiang, Wang Jianjun, “A Contourlet-Based Image Watermarking Algorithm Combined with HVS”, Journal of Computer-Aided Design and Computer Graphics, Vol.19, No.6, pp.811816, 2007. http://caod.oriprobe.com/articles/12578934/A_Contourlet_Based_Image_Watermarking_Algorit hm_Combined_with_HVS.htm Conference publications (18) 1. Mehan V., Dhir R., Brar Y.S., “Joint watermarking and fingerprinting approach for colored digital images in double DCT domain”, Proceedings – IEEE International Conference on Signal Processing Computing and Control (ISPCC), pp. 1-6, 2013. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6663390 , Ref. [5] 2. I. Orovic, N. Zaric, S. Stankovic, "An Analysis of Quantization Influence on Optimal Detection of Multiplicative Watermark," Proceedings - 55th International Symposium ELMAR 2013, Zadar, Croatia, Sept. 2013. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6658315 , Ref. [3] 5 3. Lai C.-C., Ko C.-H., Yeh C.-H., “An adaptive SVD-based watermarking scheme based on genetic algorithm”, Proceedings – International Conference on Machine Learning and Cybernetics, ICMLC 2012, Vol. 4, pp. 1546-1551, 2012. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6359595 , Ref. [6] 4. Zhang Yifeng, Jia Chengwei, Xu Zhengkang, Wang Kai, Pei Wenjiang, “Modified spreadtransform dither modulation”, Proceedings – International Conference on Wireless Communications and Signal Processing, WCSP 2011, pp. 1-5, 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6096728 , Ref. [2] 5. Oh T.-W., Ryu S.-J., Lee H.-K., “Invisible logo watermarking using visualization of spread spectrum signal on high definition video”, Proceedings – 7th International Symposium on Image and Signal Processing and Analysis, ISPA 2011, pp. 218-223, 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6046609 , Ref. [11] 6. Lee M.-J., Lee J.-W., Lee H.-K., “Perceptual watermarking for 3D stereoscopic video using depth information”, Proceedings – 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2011, pp. 81-84, 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6079539 , Ref. [12] 7. Wang C., Zhuang X., “A watermark scheme based on residual”, Proceedings – 2nd International Conference on Mechanic Automation and Control Engineering, MACE 2011, pp. 4-7, 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5986843 , Ref. [5] 8. Wang C., Zhuang X., “A watermarking scheme based on digital images’ signatures”, Proceedings – 2nd International Conference on Multimedia Technology, ICMT 2011, pp. 125127, 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6003065 , Ref. [1] 9. Nian G., Tang X., Wang D., Liu H. “Print-scan resilient data hiding scheme applied in certificate verification”, Proceedings – 3rd International Congress on Image and Signal Processing, CISP 2010, Vol. 3, pp. 1161-1165, 2010. http://www.scopus.com/record/display.url?eid=2-s2.078650535447&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=OWi-YidWJmk9eEPpjzQ1_n%3a00&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=2&relpos=2 &searchTerm=ALL%28karybali%29 , Ref. [5] 10. T.-W. Oh, K.-S. Kim, H.-Y. Lee, J.-W. Lee, H.-K. Lee, “Enhancing Perceptual Quality of Watermarked High-Definition Video through Composite Mask”, Proceedings of the 2nd International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), pp. 161-165, 2010. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5586742 , Ref. [15] 11. T.-W. Oh, S.-J. Ryu, J.-W. Lee, H.-K. Lee “Improved Watermark Estimation Scheme Based on Neighborhood Filter”, Proceedings – 6th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2010), pp. 55-58, 2010 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5635774 , Ref. [10] 12. Megalingam, R.K.; Nair, M.M.; Srikumar, R.; Balasubramanian, V.K.; Sarma, V.S.V., “Performance Comparison of Novel, Robust Spatial Domain Digital Image Watermarking with the Conventional Frequency Domain Watermarking Techniques”, Proceedings of the 2010 International Conference on Signal Acquisition and Processing, pp. 349 - 353, 2010. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5432770 , Ref. [11] 13. Antonis Mairgiotis, Nikolaos Galatsanos, “A hierarchical spatially adaptive image model for perceptual mask design and multiplicative watermark detection”, Proceedings of the 1st IEEE International Workshop on Information Forensics and Security (WIFS), pp. 6-10, 2009. 6 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5386494 , Ref. [10] 14. Xinshan Zhu, “A new Spatial Perceptual Mask for Image Watermarking”, Proceedings of the 19th International Conference on Pattern Recognition, pp. 1-4, 2008. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4761640 , Ref. [3] 15. Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh and Heung-Kyu Lee, “A Practical Real-Time Video Watermarking Scheme Robust against Downscaling Attack”, Proceedings of the 6th International Workshop on Digital Watermarking, Vol. 5041/2008, pp. 323-334, Springer LNCS, 2008. http://www.springerlink.com/content/gn815822741n1ht7/fulltext.pdf, Ref. [12] 16. Samia Belkacem, Zohir Dibi and Ahmed Bouridane, “Robust Color Image Watermarking Scheme”, Proceedings of the 4th International Conference on Computer Integrated Manufacturing CIP΄ 2007, 2007. http://www.univ-setif.dz/cip2007/Theme_C/Articles_C/C04.pdf, Ref. [3] 17. Samia Belkacem, Zohir Dibi and Ahmed Bouridane, “Luminance – Model for Spread Spectrum Image Watermarking”, Proceedings of the 4th International Conference on Computer Integrated Manufacturing CIP΄ 2007, 2007. http://www.univ-setif.dz/cip2007/Theme_C/Articles_C/C05.pdf, Ref. [5] 18. Samia Belkacem, Zohir Dibi, Ahmed Bouridane, “A Comparative Study of DCT Image Watermarking Algorithms”, JIG’2007 - 3èmes Journées Internationales sur l’Informatique Graphique, 29-30 October, 2007. http://www.umc.edu.dz/vf/proceeding/JIG2007/sessionA1/jig01szasession%20A1-01.pdf, Ref.[3] MSc and PhD theses (5) 1. Ying Yang, “Information analysis for Steganography and Steganalysis in 3D Polygonal Meshes”, Ph.D. Thesis, School of Engineering and Computing Science, University of Durham, United Kindom, 2013. http://etheses.dur.ac.uk/8492/1/Thesis_final_YingYang.pdf?DDD10+ , Ref. [61] 2. Amir Valizadeh, “Improved spread spectrum schemes for data hiding and their security analysis under known message attack”, Ph.D. Thesis, Electrical and Computer Engineering, The University of British Columbia, 2013. https://circle.ubc.ca/bitstream/handle/2429/44390/ubc_2013_fall_valizadeh_amir.pdf?sequence= 3 , Ref. [59] 3. Nicola Zaric, “Vremensko-frekvencijske distribucije sa realnim i kompleksnim argumentom vremena: hardverske realizacije i primjena u digitalnom watermarkingu”, Ph.D. Thesis, Faculty of Electrical Engineering, University of Montenegro, 2010. http://www.tfsa.ac.me/pap/Nikola_PhD.pdf , Ref. [79] 4. Fan Zhang, “Research on visual distortion for information hiding”, Ph.D. Thesis, Media and Communication Lab, Huazhong University of Science and Technology, Wuhan, P.R.China, 2008. http://mc.eistar.net/Publications.htm#Thesis , Ref. [112] 5. Jidong Zhong, “Watermark Embedding and Detection”, PhD Thesis, Shanghai Jiaotong University, 2007 7 http://arxiv.org/ftp/arxiv/papers/0706/0706.0427.pdf , Ref. [118] C6 (3) Journal publications (3) 1. Uss M.L., Vozel B., Dushepa V.A., Komjak V.A. and Chehdi K., “A precise lower bound on image subpixel registration accuracy”, IEEE Transactions on Geoscience and Remote Sensing, Vol. 52, No. 6, pp. 3333-3345, 2014. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6570757&url=http%3A%2F%2Fieeexpl ore.ieee.org%2Fstamp%2Fstamp.jsp%3Ftp%3D%26arnumber%3D6570757 , Ref. [21] 2. Bian J., Men C. Li X. Li J., “Multiscale-based stereo matching method for small baselines”, Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol. 40, Issue 7, pp. 62-66, Jul. 2012. http://www.scopus.com/record/display.url?eid=2-s2.084865827488&origin=resultslist&sort=plff&src=s&st1=karybali&sid=8D5FED3454CFB71C2A5CC6F1FA96F347.N5T5nM1aaTEF8rE6 yKCR3A%3a20&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=2&relpos=2&searchT erm=ALL%28karybali%29 , Ref. [14] 3. G. K. Stylios, “International textile and clothing research register”, International Journal of Clothing Science and Technology, Vol. 18, No. 6, pp. 1-80, 2006, Emerald Group Publishing Limited. http://www.ingentaconnect.com/content/mcb/058/2007/00000019/00000006/art00001 C5 (2) Conference publications (2) 1. Sutunc, M. Keskinoz, M. Karabat, C., “Improving the performance of wavelet domain spread spectrum watermarking systems using space-time block codes”, Proceedings of the 17th IEEE Signal Processing and Communications Applications Conference, pp. 484-487, 2009. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5136438&isnumber=5136316 , Ref. [3] 2. C. Karabat, “Space Time Block Coding for Spread Spectrum Watermarking Systems”, Proceedings of the 7th International Workshop on Digital Watermarking, Vol. 5450/2009, pp. 266-277, Springer LNCS, 2009. http://www.springerlink.com/content/d228420105l273h1/fulltext.pdf , Ref. [5] C4 (1) Journal publications (1) 1. Zeki A.M., Manaf A.A., Ibrahim A.A., Zamani M., “A robust watermark embedding in smooth areas”, Research Journal on Information Technology, Vol. 3, No. 2, pp. 123-131, 2011. http://www.scopus.com/record/display.url?eid=2-s2.080054778168&origin=resultslist&sort=plf-f&src=s&st1=karybali&sid=6YQjC1UPLhd1lOsvIf4bYa%3a30&sot=b&sdt=b&sl=13&s=ALL%28karybali%29&relpos=6&relpo s=6&searchTerm=ALL%28karybali%29 , Ref. [15] 8 C3 (4) Journal publications (2) 1. Ling Jie, Liu Ju, Sun Jian-de, Sun Xing-hua, “Visual Model Based Iterative AQIM Watermark Algorithm”, Acta Electronica Sinica, Vol. 38, No.1, pp. 151-155, 2010. http://www.docin.com/p-50418358.html , Ref. [5] 2. Peng Qiu-Ming, Yang Xia-Fan, Huang Song, Li Si-Jing, Bai Sen, “A Novel Adaptive Blind Digital Watermarking Algorithm”, Computer Science, Vol. 32, No. 8, pp.63-66, 2005. http://caod.oriprobe.com/articles/9607667/A_Novel_Adaptive_Blind_Digital_Watermarking_Al gorithm.htm , Ref. [12] Conference publications (1) 1. Yifeng Zhang, Chengwei Jia, Zhengkang Xu, Kai Wang and Wenjiang Pei “Modified spreadtransform dither modulation”, Proceedings of the Wireless Communications and Signal Processing (WCSP) Conference, pp. 1-5, 2011. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6096728 , Ref. [2] MSc and PhD theses (1) 1. Chen-Husan Tasi, “An Image Error Detection and Error Concealment Scheme based on Interleaving Prediction and Block Direction Hiding”, MSc Thesis, Graduate Institute of Information Management, Chaoyang University of Technology, Taiwan, 2006. http://ethesys.lib.cyut.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0710106-063357 , Ref. [12] 9