[1] امیرمسعود مولائی کرمانی، محمدحسین صداقی، حسین ابراهیمنژاد، «استگانوگرافی کور مبتنی بر کدهای Reed-Solomon و جدول جانشانی بهینه با بهبود بار مفید جاسازی و مقاومت»، مجله مهندسی برق تبریز، دوره 43، شماره دو، صفحه 59-43، زمستان 92.
[2] C. Song, S. Sudirman, M. Merabti, and D. Llewellyn-Jones, “Analysis of digital image watermark attacks,” In Proc. Consumer Communications and Networking Conference (CCNC), pp. 1-5, 2010.
[3] M. F. Mansour, and A. H. Tewfik, “Attacks on quantization-based watermarking schemes,” In Proc. Signal Processing and Its Applications, vol. 2, pp. 367-370, 2003.
[4] T. C. Hsu, W. S. Hsieh, and T. S. Su, “A new watermark attacking method based on eigen-image energy,” In Proc. Intelligent Information Hiding and Multimedia Signal, (IIHMSP), pp. 29-32, 2008.
[5] G. C. Ting, B. M. Goi, and S. H. Heng, “Attacks on a robust watermarking scheme based on self-reference image,” Computer Standards & Interfaces, vol. 30, no. 1, pp. 32-35, 2008.
[6] H. C. Ling, R. C. Phan, and S. H. Heng, “Attacks on SVD-based watermarking schemes,” In Proc. Intelligence and Security Informatics, pp. 83-91, 2008.
[7] P. Meerwald, C. Koidl, and A. Uhl, “Targeted attacks on quantization-based watermarking schemes,” In Proc. Image and Signal Processing and Analysis (ISPA), pp. 465-470, 2009.
[8] J. M. Guo, and H. Prasetyo, “Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, 2014.
[9] P. Nikbakht, and M. Mahdavi, “Targeted watermark removal of a SVD-based image watermarking scheme,” InInformation and Knowledge Technology (IKT), pp. 1-6, 2015.
[10] P. Nikbakht, and M. Mahdavi, “Targeted dewatermarking of two non-blind SVD-based image watermarking schemes,” In Proc. Computer and Knowledge Engineering (ICCKE), pp. 80-86, 2015.
[11] O. O. Khalifa, Y. binti Yusof, and A. H. Abdalla, "State-of-the-art digital watermarking attacks," IEEE International Conference on. Computer and Communication Engineering (ICCCE), , pp. 744-750, 2012.
[12] A. H. Taherinia, and M. Jamzad, “A two‐step watermarking attack using long‐range correlation image restoration,” Security and Communication Networks, vol. 5, no. 6, pp. 625-635, 2012.
[13] D. Zhang, and Z. Wang, “Image information restoration based on long-range correlation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, no. 5, pp. 331-341, 2002.
[14] A. H. Taherinia, and M. Jamzad, “A new watermarking attack based on content-aware image resizing,” In Proc. Multimedia, Signal Processing and Communication Technologies, pp. 177-180, 2009.
[15] A. H. Taherinia, and M. Jamzad, “Blind dewatermarking method based on wavelet transform,” Optical Engineering, vol. 50, no. 5, pp. 057006-057006, 2011.
[16] P. L. Shrestha, M. Hempel, T. Ma, D. Peng, and H. Sharif, “A general attack method for steganography removal using Pseudo-CFA re-interpolation,” In Proc. Internet Technology and Secured Transactions (ICITST), pp. 454-459, 2011.
[17] V. S. Verma, and R. K. Jha, “Improved watermarking technique based on significant difference of lifting wavelet coefficients,” Signal, Image and Video Processing, vol. 9, no. 6, pp. 1443-1450, 2015.
[18] R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Susstrunk, “SLIC superpixels compared to state-of-the-art superpixel methods,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 11, pp. 2274-2282, 2012.