Sayısal Filigran
Özet
Referanslar
Abbasfard, M., 2009. Digital Image Watermarking Robustness: A Comparative Study, Bilgisayar Mühendisliği A.B.D., Yüksek Lisans Tezi, 74s, Delft University of Technology, Hollanda.
Abbate, J., 1999. Inventing the Web, Proceedings of the IEEE, 87(11), 1999–2002.
Abdülkhaev, A., 2016. A New Approach for Video Watermarking, Gaziantep Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 66s.
Aigal, P., Vasambekar, P., 2012. Hiding Data in Wave Files, International Conference in Recent Trends in Information Technology and Computer Science, 20-24.
Al-Nazer, A., Gutub, A., 2009. Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography, International Workshop on Frontiers of Information Assurance & Security (FIAS 2009) - IEEE 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Queensland, Avusturalya, 447-451.
Alasafi, L., 2016. Copyright Protection By Robust Digital Image Watermarking in Unsecured Communication Channels, Süleyman Demirel Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 62s, Isparta.
Alla, K., Prasad, R. S. R., 2009. An Evolution of Hindi Text Steganography, Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, 1577 – 1578.
Alsalami, M.A.T., Al-Akaidi, M.M., 2003. Digital Audio Watermarking - A Survey, Proceedings of 17th European Simulation Conference, 25s.
Anderson, R. (Ed), 1996. Information Hiding - Vol 1174 of Lecture Notes in Computer Science, 350s, Springer-Verlag.
Arnold, M., Schmucker, M., Wolthusen, S.D., 2003. Techniques and Applications of Digital Watermarking and Content Protection, Artech House, 273s, Londra.
Baraklı, B., 2014. Tersinir Video Damgalama, Sakarya Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 101s.
Bender W., Gruhl D., Morimoto N., Lu A., 1996. Techniques for data hiding, IBM Systems Journal, (35)3-4, 313–336.
Bennett, K., 2004. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text, CERIAS Tech Report 2004-13, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, Indiana, USA.
Bhattacharyya, S., Kundu, A., Sanyal, G., 2011. A Novel Audio Steganography Technique by M16MA, International Journal of Computer Applications, (30)8, 26-34.
Boyacı, O., 2017. Doğal Dilde Steganografi, İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 73s.
Boreiry, M., Keyvanpour, M.R., 2017. Classification of Watermarking Methods Based on Watermarking Approaches, Artificial Intelligence and Robotics (IRANOPEN) ,Tahran, İran, 73-76.
Brassil, J., Low, S., Maxemchuk, N., O'Gorman, L. 1995. Hiding Information in Document Images, Proceedings of the 29th Annual Conference on Information Sciences and Systems, 482-489.
Chaum D., 1981. Untraceable Electronic Mail, Return DWTresses and Digital Pseudonyms, Communications of the ACM, 24(2), 84-88.
Chore, A.M., Tiwari, N., 2017. Survey on Different Methods of Digital Audio Watermarking, Int. Journal of Engineering Research and Application, (7)6, 113-116.
Cox, I.J., Miller, M.L., 2002. The First 50 Years of Electronic Watermarking, EURASIP Journal on Applied Signal Processing (2), 126-132.
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T., 2007. Digital Watermarking and Steganography 2nd Edition, Morgan Kaufmann Publishers, 624s, U.S.A.
Cox, I., Miller, M., Bloom, J., 2000. Watermarking Applications and Their Properties, International Conference on Information Technology 2000, Las Vegas, 1-5.
Dar, A.B., 2014. Watermarking in Frequency Domain A Review, International Journal Of Engineering And Computer Science, (3)11, 9215-9218.
Decker, S., 2001. Engineering considerations in Commercial Watermarking, IEEE Communications Magazine, 39(8), 128-133.
Doğan, Ş., 2011. Yeni bir sayısal damgalama tekniği ile biyometrik uygulamalar, Fırat Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 128s, Elazığ.
Eggers, J.J., Bauml, R., Girod, B., 2002. A Communications Approach to Image Steganography, Proceedings of SPIE (4675) Security and Watermarking of Multimedia Contents IV San Jose, California, USA.
Ertürkler, M., 2007. Sayısal filigranlar ile kripto imzalarının birlikte kullanılması ve çoklu ortam verisi üzerindeki uygulamaları, Fırat Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 220s.
Farid, H., 2001. Detecting Steganographic Message in Digital Images, Technical Report TR2001-412, Dartmouth College, 1-9.
Feng, J.B., Lin, I.C., Tsai, C.S., Chu Y.P., 2006. Reversible watermarking: Current status and key issues, International Journal of Network Security, 2(3), 161-171.
Fındık, O., 2010. Yapay Zeka Teknikleri Kullanarak Sabit Görüntüler İçin Sayısal Damgalama, Selçuk Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 120s.
Fridrich, J., 2006. Minimizing The Embedding Impact in Steganography, Proceeding of the 8th Workshop on Multimedia and Security, Geneva- İsviçre, 2-10.
Gupta, M.D. (Ed), 2012. Watermarking - Volume 2, INTECH, 276s, Slavka Krautzeka, Hırvatistan.
Hamza, Y.A., 2008. Blok Kırpma Kodlamasına ve Ayrık Dalgacık Dönüşümüne Dayalı, Dayanıklı Dijital Renkli Resim Damgalama Sistemi, Anadolu Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 92s.
Hartung, F., Girod, B., 1997. Watermarking of uncompressed and compressed video, Signal Processing, (66), 283-301.
Hering, H.,Hagmüller, M., Kubin, G., 2003. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication, Proceedings of the 22’nd Digital Avionics Systems Conference, 4(2), 1–10.
Herodotus, 1996. The Histories, Çev. S´elincourt, A., Penguin Books, 688s, Londra.
Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.L., 2016. Twenty years of digital audio watermarking - a comprehensive review, Signal Processing, (128), 222–242.
Kahalkar, C., 2012. Digital Audio Watermarking for Copyright Protection, International Journal of Computer Science and Information Technologies, (3), 4185-4188.
Karpinskyy M., Kinakh Y., 2003. Reliability of RSA Algorithm and its Computational Complexity, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Lviv, Ukrayna, 494-496.
Kashyap, N., Singh, S.N., 2014. Analysis of Multimedia Watermarking Techniques, International Journal of Emerging Technology and Advanced Engineering, (4)2, 517-521.
Khatri, G.B., Chaudhari, D.S., 2013. Digital Audio Watermarking Applications and Techniques, International Journal of Electronics and Communication Engineering & Technology (IJECET), (4)2, 109-115
Ko, B.S., Nishimura, R., Suzuki, Y., 2005. Time-spread echo method for digital audio watermarking, IEEE Trans. Multimedia, (7)2, 212–221.
Komatsu, N ve Tominaga, H., 1988. Authentication system using concealed image in telematics, Memoirs of the School of Science and Engineering, Waseda University, 52:45–60.
Koyun, A., Macit, H. B., 2018. Generating a stego-audio data using LSB technique and robustness test, Journal of Engineering Sciences and Design, 6(1), 87-92.
Kutucu, H., Dişli, A., Akça, M., 2015. Çok Katmanlı Steganografi Tekniği Kullanılarak Mobil Cihazlara Haberleşme Uygulaması, Akademik Bilişim Konferansı, Eskişehir.
Liu, B., Xu, E., Wang, J., Wei, Z., Xu, L., Zhao, B., Su, J., 2011. Thwarting Audio Steganography Attacks in Cloud Storage Systems, International Conference on Cloud and Service Computing, 259-265.
Mahajan, D.L., Gogate, S.A., 2016. Overview of Digital Watermarking and its Techniques, MIT- SOM PGRC KJIMRP National Research Conference (Special Issue), 197-204.
Mahmoud, K., Datta, S., Flint J., 2005. Frequency Domain Watermarking: An Overview, The International Arab Journal of Infotmation Technology, (2)1, 33-47.
Monathy, S.P., 1999. Digital Watermarking: A Tutorial Review, Report, Dept. Of Electrical Engineering, Indian Institute of Science, 24s.
Oğuz, C., 2006. Görüntü İşaretleri için Yeni Bir Sayısal Damgalama Yöntemi, İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 100s, İstanbul.
Öztürk, M., 2009. Zaman-Frekans Analizi Kullanarak Görüntü Damgalama, İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 110s.
Pan J.S., Huang H.C., Jain L.C., 2004. Intelligent Watermarking Techniques, World Scientific Publishing Co. Pte. Ltd., 680 p.
Patel, M., Sajja, P.S., Sheth, R., 2013. Analysis and Survey of Digital Watermarking Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, (3)10, 203-210.
Petitcolas, F.A.P., Anderson, R.J. Kuhn, M.G., 1999. Information Hiding: A Survey, Proceedings of the IEEE, 87 (7), 1062-1078.
Po, L.M., 2001. Lenna 97: A Complete Story of Lenna. Erişim tarihi: 06.09.2018, http://www.ee.cityu.edu.hk/~lmpo/lenna/Lenna97.html.
Podilchuk, C.I., Delp, E.J., 2001. Digital watermarking: algorithms and applications, IEEE Signal Processing Magazine, 18(4), 33-46.
Qiao, L., Nahrstedt, K., 1999. Non-invertible watermarking methods for MPEG encoded audio. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Data, (3657), 194–203.
Rachid, R.S.,2014. Binary Image Watermarking on Audio Signal Using Wavelet Transform, Çankaya Üniversitesi, Matematik-Bilgisayar Bilimleri Bölümü, Yüksek Lisans Tezi, 42s, Ankara.
Samphaiboon, N., 2009. Steganography via running short text messages, Multimedia Tool Applications, 52(2–3), 569–596.
Shih, F. Y., 2005. Digital Watermarking and Steganography Fundamentals and Techniques, CRC Press, 200s, London
Simpson, J., ve Weiner, E, 1989. Oxford English Dictionary, Oxford University Press, 22000s, Oxford, England.
Spainas, A., Painter, T., Atti, V., 2007. Audio Signal Processing and Coding, Wiley Interscience, 459s, New Jersey, A.B.D.
Szepanski, W., 1979. A signal theoretic method for creating forgery-proof documents for automatic verification, Carnahan Conference on Crime Counter measures, Proceedings May 16-18, 101–109.
Şatır, E., 2013. Bilgi Güvenliği İçin Metin Steganografisinde Yeni Bir Yaklaşım, Selçuk Üniversitesi, Fen Bilimleri Enstitüsü, 82s.
Şen, Ş., 2006. İndirgenmiş SPN (Substitution Permutatin Network) Algoritması için Lineer Kriptanaliz Uygulaması, Yüksek Lisans Tezi, Trakya Üniversitesi, Fen Bilimleri Enstitüsü, 113s, Edirne.
Tacticius, A. 2002. How to Survive Under Siege, Clarendon ancient history series, Çev. Whitehead, D., Bristol Classical Press, 236s, Bristol, U.K.
Tunçer, S., Karakuzu, C., 2016. Veri Güvenliğini Artırmak Amacıyla Bilgiyi Şifreleme ve Steganografik Yöntemlerle Görüntüye Gizleme, Elektrik-Elektronik ve Bilgisayar Sempozyumu, Tokat, Türkiye, 183-87.
Uçar, A., 2014. Gezgin Ortamda Görüntü Damgalama Uygulaması, Kocaeli Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 34s.
UK Patent, GB 2196167A,1988. Holt, L., Maufe, B. G., ve Wiener, A., Encoded marking of a recording signal.
United States Patent, 3,004,104, 1961. Hembrooke, E.F., Identification of soundandlikesignals.
United States Patent, 4,281,217, 1981. Dolby, R., Apparatus and method for the identification of specially encoded FM stereophonic broadcasts.
Ülker, E., Fındık, O., İşcan, H., 2006. Selçuk Üniversitesinde Sayısal İmza Uygulaması, Ulusal Elektronik İmza Sempozyumu, Ankara, 123-129.
Vassiliadis, S., Wong, S., Gaydadjiev, G., Bertels, K., Kuzmanov, G., Panainte, E.M., 2004. The Molen Polymorphic Processor, IEEE Transactions on Computers, (190), 1363–1375.
Yalman, Y., Ertürk, İ., 2009. Gerçek Zamanlı Video Kayıtlarına Veri Gizleme Uygulaması, XI. Akademik Bilişim Konferansı Bildirileri, Harran Üniversitesi, Şanlıurfa, 545-552.
Yavuz, E., 2008. Duruk İmgelerde Damgalama ve Veri Saklama, Ankara Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 167s.
Yıldırım, İ., 2017. Şifreli ve Şifresiz Videolar İçin Yinelemeli Histogram Değiştirme Tabanlı Tersinir Video Damgalama, Sakarya Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 86s, Sakarya.
Zhang, X., Xie, X., 2014. Audio Watermarking Based on Multiple Echoes Hiding for FM Radio, Interspeech 2014 Singapore, 1386-1390.
Referanslar
Abbasfard, M., 2009. Digital Image Watermarking Robustness: A Comparative Study, Bilgisayar Mühendisliği A.B.D., Yüksek Lisans Tezi, 74s, Delft University of Technology, Hollanda.
Abbate, J., 1999. Inventing the Web, Proceedings of the IEEE, 87(11), 1999–2002.
Abdülkhaev, A., 2016. A New Approach for Video Watermarking, Gaziantep Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 66s.
Aigal, P., Vasambekar, P., 2012. Hiding Data in Wave Files, International Conference in Recent Trends in Information Technology and Computer Science, 20-24.
Al-Nazer, A., Gutub, A., 2009. Exploit Kashida Adding to Arabic e-Text for High Capacity Steganography, International Workshop on Frontiers of Information Assurance & Security (FIAS 2009) - IEEE 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Queensland, Avusturalya, 447-451.
Alasafi, L., 2016. Copyright Protection By Robust Digital Image Watermarking in Unsecured Communication Channels, Süleyman Demirel Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 62s, Isparta.
Alla, K., Prasad, R. S. R., 2009. An Evolution of Hindi Text Steganography, Sixth International Conference on Information Technology: New Generations, ITNG 2009, Las Vegas, Nevada, 1577 – 1578.
Alsalami, M.A.T., Al-Akaidi, M.M., 2003. Digital Audio Watermarking - A Survey, Proceedings of 17th European Simulation Conference, 25s.
Anderson, R. (Ed), 1996. Information Hiding - Vol 1174 of Lecture Notes in Computer Science, 350s, Springer-Verlag.
Arnold, M., Schmucker, M., Wolthusen, S.D., 2003. Techniques and Applications of Digital Watermarking and Content Protection, Artech House, 273s, Londra.
Baraklı, B., 2014. Tersinir Video Damgalama, Sakarya Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 101s.
Bender W., Gruhl D., Morimoto N., Lu A., 1996. Techniques for data hiding, IBM Systems Journal, (35)3-4, 313–336.
Bennett, K., 2004. Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text, CERIAS Tech Report 2004-13, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, Indiana, USA.
Bhattacharyya, S., Kundu, A., Sanyal, G., 2011. A Novel Audio Steganography Technique by M16MA, International Journal of Computer Applications, (30)8, 26-34.
Boyacı, O., 2017. Doğal Dilde Steganografi, İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 73s.
Boreiry, M., Keyvanpour, M.R., 2017. Classification of Watermarking Methods Based on Watermarking Approaches, Artificial Intelligence and Robotics (IRANOPEN) ,Tahran, İran, 73-76.
Brassil, J., Low, S., Maxemchuk, N., O'Gorman, L. 1995. Hiding Information in Document Images, Proceedings of the 29th Annual Conference on Information Sciences and Systems, 482-489.
Chaum D., 1981. Untraceable Electronic Mail, Return DWTresses and Digital Pseudonyms, Communications of the ACM, 24(2), 84-88.
Chore, A.M., Tiwari, N., 2017. Survey on Different Methods of Digital Audio Watermarking, Int. Journal of Engineering Research and Application, (7)6, 113-116.
Cox, I.J., Miller, M.L., 2002. The First 50 Years of Electronic Watermarking, EURASIP Journal on Applied Signal Processing (2), 126-132.
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T., 2007. Digital Watermarking and Steganography 2nd Edition, Morgan Kaufmann Publishers, 624s, U.S.A.
Cox, I., Miller, M., Bloom, J., 2000. Watermarking Applications and Their Properties, International Conference on Information Technology 2000, Las Vegas, 1-5.
Dar, A.B., 2014. Watermarking in Frequency Domain A Review, International Journal Of Engineering And Computer Science, (3)11, 9215-9218.
Decker, S., 2001. Engineering considerations in Commercial Watermarking, IEEE Communications Magazine, 39(8), 128-133.
Doğan, Ş., 2011. Yeni bir sayısal damgalama tekniği ile biyometrik uygulamalar, Fırat Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 128s, Elazığ.
Eggers, J.J., Bauml, R., Girod, B., 2002. A Communications Approach to Image Steganography, Proceedings of SPIE (4675) Security and Watermarking of Multimedia Contents IV San Jose, California, USA.
Ertürkler, M., 2007. Sayısal filigranlar ile kripto imzalarının birlikte kullanılması ve çoklu ortam verisi üzerindeki uygulamaları, Fırat Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 220s.
Farid, H., 2001. Detecting Steganographic Message in Digital Images, Technical Report TR2001-412, Dartmouth College, 1-9.
Feng, J.B., Lin, I.C., Tsai, C.S., Chu Y.P., 2006. Reversible watermarking: Current status and key issues, International Journal of Network Security, 2(3), 161-171.
Fındık, O., 2010. Yapay Zeka Teknikleri Kullanarak Sabit Görüntüler İçin Sayısal Damgalama, Selçuk Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 120s.
Fridrich, J., 2006. Minimizing The Embedding Impact in Steganography, Proceeding of the 8th Workshop on Multimedia and Security, Geneva- İsviçre, 2-10.
Gupta, M.D. (Ed), 2012. Watermarking - Volume 2, INTECH, 276s, Slavka Krautzeka, Hırvatistan.
Hamza, Y.A., 2008. Blok Kırpma Kodlamasına ve Ayrık Dalgacık Dönüşümüne Dayalı, Dayanıklı Dijital Renkli Resim Damgalama Sistemi, Anadolu Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 92s.
Hartung, F., Girod, B., 1997. Watermarking of uncompressed and compressed video, Signal Processing, (66), 283-301.
Hering, H.,Hagmüller, M., Kubin, G., 2003. Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication, Proceedings of the 22’nd Digital Avionics Systems Conference, 4(2), 1–10.
Herodotus, 1996. The Histories, Çev. S´elincourt, A., Penguin Books, 688s, Londra.
Hua, G., Huang, J., Shi, Y.Q., Goh, J., Thing, V.L.L., 2016. Twenty years of digital audio watermarking - a comprehensive review, Signal Processing, (128), 222–242.
Kahalkar, C., 2012. Digital Audio Watermarking for Copyright Protection, International Journal of Computer Science and Information Technologies, (3), 4185-4188.
Karpinskyy M., Kinakh Y., 2003. Reliability of RSA Algorithm and its Computational Complexity, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Lviv, Ukrayna, 494-496.
Kashyap, N., Singh, S.N., 2014. Analysis of Multimedia Watermarking Techniques, International Journal of Emerging Technology and Advanced Engineering, (4)2, 517-521.
Khatri, G.B., Chaudhari, D.S., 2013. Digital Audio Watermarking Applications and Techniques, International Journal of Electronics and Communication Engineering & Technology (IJECET), (4)2, 109-115
Ko, B.S., Nishimura, R., Suzuki, Y., 2005. Time-spread echo method for digital audio watermarking, IEEE Trans. Multimedia, (7)2, 212–221.
Komatsu, N ve Tominaga, H., 1988. Authentication system using concealed image in telematics, Memoirs of the School of Science and Engineering, Waseda University, 52:45–60.
Koyun, A., Macit, H. B., 2018. Generating a stego-audio data using LSB technique and robustness test, Journal of Engineering Sciences and Design, 6(1), 87-92.
Kutucu, H., Dişli, A., Akça, M., 2015. Çok Katmanlı Steganografi Tekniği Kullanılarak Mobil Cihazlara Haberleşme Uygulaması, Akademik Bilişim Konferansı, Eskişehir.
Liu, B., Xu, E., Wang, J., Wei, Z., Xu, L., Zhao, B., Su, J., 2011. Thwarting Audio Steganography Attacks in Cloud Storage Systems, International Conference on Cloud and Service Computing, 259-265.
Mahajan, D.L., Gogate, S.A., 2016. Overview of Digital Watermarking and its Techniques, MIT- SOM PGRC KJIMRP National Research Conference (Special Issue), 197-204.
Mahmoud, K., Datta, S., Flint J., 2005. Frequency Domain Watermarking: An Overview, The International Arab Journal of Infotmation Technology, (2)1, 33-47.
Monathy, S.P., 1999. Digital Watermarking: A Tutorial Review, Report, Dept. Of Electrical Engineering, Indian Institute of Science, 24s.
Oğuz, C., 2006. Görüntü İşaretleri için Yeni Bir Sayısal Damgalama Yöntemi, İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 100s, İstanbul.
Öztürk, M., 2009. Zaman-Frekans Analizi Kullanarak Görüntü Damgalama, İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 110s.
Pan J.S., Huang H.C., Jain L.C., 2004. Intelligent Watermarking Techniques, World Scientific Publishing Co. Pte. Ltd., 680 p.
Patel, M., Sajja, P.S., Sheth, R., 2013. Analysis and Survey of Digital Watermarking Techniques, International Journal of Advanced Research in Computer Science and Software Engineering, (3)10, 203-210.
Petitcolas, F.A.P., Anderson, R.J. Kuhn, M.G., 1999. Information Hiding: A Survey, Proceedings of the IEEE, 87 (7), 1062-1078.
Po, L.M., 2001. Lenna 97: A Complete Story of Lenna. Erişim tarihi: 06.09.2018, http://www.ee.cityu.edu.hk/~lmpo/lenna/Lenna97.html.
Podilchuk, C.I., Delp, E.J., 2001. Digital watermarking: algorithms and applications, IEEE Signal Processing Magazine, 18(4), 33-46.
Qiao, L., Nahrstedt, K., 1999. Non-invertible watermarking methods for MPEG encoded audio. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Data, (3657), 194–203.
Rachid, R.S.,2014. Binary Image Watermarking on Audio Signal Using Wavelet Transform, Çankaya Üniversitesi, Matematik-Bilgisayar Bilimleri Bölümü, Yüksek Lisans Tezi, 42s, Ankara.
Samphaiboon, N., 2009. Steganography via running short text messages, Multimedia Tool Applications, 52(2–3), 569–596.
Shih, F. Y., 2005. Digital Watermarking and Steganography Fundamentals and Techniques, CRC Press, 200s, London
Simpson, J., ve Weiner, E, 1989. Oxford English Dictionary, Oxford University Press, 22000s, Oxford, England.
Spainas, A., Painter, T., Atti, V., 2007. Audio Signal Processing and Coding, Wiley Interscience, 459s, New Jersey, A.B.D.
Szepanski, W., 1979. A signal theoretic method for creating forgery-proof documents for automatic verification, Carnahan Conference on Crime Counter measures, Proceedings May 16-18, 101–109.
Şatır, E., 2013. Bilgi Güvenliği İçin Metin Steganografisinde Yeni Bir Yaklaşım, Selçuk Üniversitesi, Fen Bilimleri Enstitüsü, 82s.
Şen, Ş., 2006. İndirgenmiş SPN (Substitution Permutatin Network) Algoritması için Lineer Kriptanaliz Uygulaması, Yüksek Lisans Tezi, Trakya Üniversitesi, Fen Bilimleri Enstitüsü, 113s, Edirne.
Tacticius, A. 2002. How to Survive Under Siege, Clarendon ancient history series, Çev. Whitehead, D., Bristol Classical Press, 236s, Bristol, U.K.
Tunçer, S., Karakuzu, C., 2016. Veri Güvenliğini Artırmak Amacıyla Bilgiyi Şifreleme ve Steganografik Yöntemlerle Görüntüye Gizleme, Elektrik-Elektronik ve Bilgisayar Sempozyumu, Tokat, Türkiye, 183-87.
Uçar, A., 2014. Gezgin Ortamda Görüntü Damgalama Uygulaması, Kocaeli Üniversitesi, Fen Bilimleri Enstitüsü, Yüksek Lisans Tezi, 34s.
UK Patent, GB 2196167A,1988. Holt, L., Maufe, B. G., ve Wiener, A., Encoded marking of a recording signal.
United States Patent, 3,004,104, 1961. Hembrooke, E.F., Identification of soundandlikesignals.
United States Patent, 4,281,217, 1981. Dolby, R., Apparatus and method for the identification of specially encoded FM stereophonic broadcasts.
Ülker, E., Fındık, O., İşcan, H., 2006. Selçuk Üniversitesinde Sayısal İmza Uygulaması, Ulusal Elektronik İmza Sempozyumu, Ankara, 123-129.
Vassiliadis, S., Wong, S., Gaydadjiev, G., Bertels, K., Kuzmanov, G., Panainte, E.M., 2004. The Molen Polymorphic Processor, IEEE Transactions on Computers, (190), 1363–1375.
Yalman, Y., Ertürk, İ., 2009. Gerçek Zamanlı Video Kayıtlarına Veri Gizleme Uygulaması, XI. Akademik Bilişim Konferansı Bildirileri, Harran Üniversitesi, Şanlıurfa, 545-552.
Yavuz, E., 2008. Duruk İmgelerde Damgalama ve Veri Saklama, Ankara Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 167s.
Yıldırım, İ., 2017. Şifreli ve Şifresiz Videolar İçin Yinelemeli Histogram Değiştirme Tabanlı Tersinir Video Damgalama, Sakarya Üniversitesi, Fen Bilimleri Enstitüsü, Doktora Tezi, 86s, Sakarya.
Zhang, X., Xie, X., 2014. Audio Watermarking Based on Multiple Echoes Hiding for FM Radio, Interspeech 2014 Singapore, 1386-1390.