[1] J.Sravanthi, M. H. M. Krishna Prasad, "Robust and Secure Digital
Signature for Image Authentication, over Wireless Channels",
International Journal of Computer Trends and Technology, pp.245-250,
2011. [2] Seitz J., ''Digital Watermarking for Digital Media'', (Idea Group
Publishing, 2005), Ch. 2. [3] Schneider M., Chang S. F., „A content based Digital Signature for
Image Authentication‟, Proc. IEEE Int. Conf. Image Processing
(ICIP‟96), 1996, pp. 227–230. [4] HayamAbdel Hameed, Emad S. Hassan, Sami El-Dolil, and F.E. Abd ElSamie" A Discrete Cosine Transform Based-Watermarking Scheme, for
Confidence Guarantee Image Transmission,” Digital Image Processing,
Vol. 6, No. 3, pp. 131-138, 2014. [5] G. H. Situ and J. Zhang, “Double Random-Phase Encoding in the Fresnel
Domain,” Opt. Lett., Vol. 29, pp. 1584-1586, July 2004. [6] G. Unnikrishnan and K. Singh, “Double Random Fractional Fourier
Domain Encoding for Optical Security,” Opt. Eng., Vol. 39, pp. 2853-
2859, November 2000. [7] J. W. Han, C. S. Park, D. H. Ryu, and E. S. Kim, “Optical Image
Encryption based on -XOR Operations,” Opt. Eng., Vol. 38, pp. 47-54,
January 1999.
[8] P. K. Wang, L. A. Watson, and C. Chatwin, “Random Phase Encooding
forOptical Security,” Opt. Eng., Vol. 35, pp. 2464-2469, September 1996. [9] Y. Li, K. Kreske, and J. Rosen, “Security and Encryption Optical System
Based on- a Correlator with Significant Output Images,” Appl. Opt., Vol.
39, pp. 5295-5301, October 2000. [10] N. Towhgi, B. Javidi, and Z. Luo, “Fully Phase Encrypted Image
Processor,” J. Opt. Soc. Am. A, Vol. 16, pp. 1915-1927, August 1999. [11] T. Nomura and B. Javidi, “Optical Encryption using a Joint
Transform Correlator Architecture,” Opt. Eng., Vol. 39, pp. 2031-2034,
August 2000. [12] X. F. Meng, L. Z. Cai, and X. L. Yang, “Information Security
Systems by-Iterative Multiple Phase Retrieval and Pixel Random
Permutation,” Appl. Opt., Vol. 45 pp. 3289-3297, May 2005. [13] Hayam A. Abdel Hameed, Emad S. Hassan, Sami A. El-Dolil,
and F.E. Abd El-Samie" A New Hybrid Scheme based on Digital
Watermarking and Signature for Confidence Guarantee Image
Transmission, “Wireless Personal Communications, DOI
10.1007/s11277-017-4381-2,2017. [14] P. Refregier and B. Javidi, “Optical Image Encryption, based onInput Plane and Fourier Plane Random Encoding,” Opt. Lett., Vol. 20,
pp. 767-769, April 1995. [15] G. Unnikrishnan, J. Joseph and K. Singh, “Optical Encryption by
Double Random Phase Encoding in the Fractional Fourier Domain,” Opt.
Lett., Vol.25, pp. 887–889, December 2000. [16] F.M. Liu, H.C. Zhai and X.P. Yang, “Kino form Based Iterative
Random Phase Encryption,” Acta. Phys., Sin.52, pp.2462–2465, October
2003 (in Chinese). [17] X.P. Yang and H.C. Zhai, “Optimization of Kino form in DoubleRandom-Phase Encryption,” Acta. Phys., Sin.54, pp. 1578–1582, April
2005 (in Chinese). [18] B.Javidi, A.Sergent, G.Zhang, and L.Guibert,“Fault Tolerance
Properties of a Double Phase Encoding Encryption Technique,” Opt.
Eng., Vol. 36, pp. 992–998, 1997. [19] Xiaojun Qi and KokSheik Wong, “An Adaptive DCT-Based
MOD-4 Steganography Method”, Proceedings of theIEEE,pp.7803-9134,
2005.
[20] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, “Steganographic
Approach for Image Hiding in DCT Domain”, International Journal of
Advances in Engineering & Technology, Issn: 2231-1963, Vol. 1, Issue
3, pp.72-78, July 2011. [21] Frank Hartung and Martin Kutter, “Multimedia Watermarking
Techniques”, Proceedings of the IEEE, Vol. 87, IEEE Press, Piscataway,
No. 7,pp.1079-1107, July 1999. [22] Lou D.C., Liu J.L. and LI C.-T. „Digital Signature-Based Image
Authentication‟, in LU C.S. (EDS.) „Multimedia Security: Steganography
and Digital Watermarking Techniques for Protection of Intellectual
Property‟ (Idea Group Inc., 2003). [23] Y. Frauel, A. Castro, T. J. Naughton, and B. Javidi, “Resistance
of the Double Random Phase Encryption Against Various Attacks,” Opt.
Express, Vol.15, pp.10253–10265, (2007). [24] A. Carnicer, M. Montes Usategui, S. Arcos, and I. Juvells,
“Vulner Ability to Chosen-Cypher Text Attacks of Optical Encryption
Schemes based on Double Random Phase Keys,” Opt. Lett., Vol.30,
pp.1644–1646, (2005). [25] X. Peng, P. Zhang, H. Wei, and B. Yu, “Known-Plaintext Attack
on Optical Encryption based on-Double Random Phase Encoding,” Opt.
Lett., Vol.31, pp.1044–1046, (2006). [26] Karuna Kesavan K.and RatheeshkumarM.,"OpticalColor Image
Encryption based on-Hartley Transform and Double Random Phase
Encoding System"7-77- 8111- pp.963-978. [27] Ahmed Elshamy, Ahmed Rashed, Abd El-Naser Mohamed,
Osama Faragalla, Yi Mu, SalehAlshebeili, and F. E. Abd El-Samie
"Optical Image Encryption based on-Chaotic Baker map and Double
Random Phase Encoding", Journal of Light Wave Technology IEEE,
Vol. 31, No. 15, pp. 2533-2539, August 2013. [28] E. M. El-Bakary, E. S. Hassan, O. Zahran, S. A. El-Dolil, and F.
E. Abd El-Samie “Efficient Image Transmission with Multi-Carrier
CDMA”, Wireless Personal Communication, DOI 10.1007/s11277-012-
0622-6. 2012. [29] E. S. Hassan, “Performance Enhancement of Continuous-Phase
Modulation Based OFDM System Using Chaotic Interleaving”, WSEAS
Transactions on Systems, Vol. 12, No. 1, pp. 1-10, Jan. 2013.