[1] M. Ghayoori Sales, Gh. R. Bazdar, and A. Sarkardei, “Introduction of the Entropy-Based Method for Finding Influential Nodes in Information Dissemination on Online Social Networks,” Journal of Electronical & Cyber Defence, vol. 6, pp. 1-9, 2018.##
[2] A. A. P. K. V. Hosseinnezhad, “Bayesian Networks Based Trust Model in Social Networks,” Journal of Electronical & Cyber Defence, vol. 6, p. 10, 2018.##
[3] N. Jiang, N. Zhao, and L. Wang, “LSB based quantum image steganography algorithm,” International Journal of Theoretical Physics, vol. 55, pp. 107-123, 2016.##
[4] M. M. Hashim, M. S. M. Rahim, F. A. Johi, M. S. Taha, and H. S. Hamad, “Performance evaluation measurement of image steganography techniques with analysis of LSB based on variation image formats”, International Journal of Engineering & Technology, vol. 7, pp. 3505-3514, 2018.##
[5] F. Ahmed and I. S. Moskowitz, “Correlation-based watermarking method for image authentication applications,” Optical Engineering, vol. 43, pp. 1833-1839, 2004.##
[6] S. A. Parah, J. A. Sheikh, N. A. Loan, F. Ahad, and G. M. Bhat, “Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks,” Multidimensional Systems and Signal Processing, vol. 29, pp. 1095-1117, 2018.##
[7] K. Chaitanya and K. G. Rao, “A Novel Approach To Medical Image Watermarking for Tamper Detection and Rcovery of Region of Interest using Predictive Coding and Hashing,” Journal of Theoretical & Applied Information Technology, vol. 96, 2018.##
[8] W. C. Chu, “DCT-based image watermarking using subsampling,” IEEE transactions on multimedia, vol. 5, pp. 34-38, 2003.##
[9] M. Singh and A. Saxena, “Image watermarking using discrete cosine transform [DCT] and genetic algorithm [GA],” 2017.##
[10] N. Kashyap and G. Sinha, “Image watermarking using 3-level discrete wavelet transform (DWT),” International Journal of Modern Education and Computer Science, vol. 4, p. 50, 2012.##
[11] S. P. Ambadekar, J. Jain, and J. Khanapuri, “Digital Image Watermarking Through Encryption and DWT for Copyright Protection,” in Recent Trends in Signal and Image Processing, ed: Springer, pp. 187-195, 2019.##
[12] M.-J. Hwang, J. Lee, M. Lee, and H.-G. Kang, “SVD-based adaptive QIM watermarking on stereo audio signals,” IEEE Transactions on Multimedia, vol. 20, pp. 45-54, 2018.##
[13] M. Kaur and V. K. Attri, “A Survey on Digital Image Watermarking and Its Techniques,” International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 8, pp. 145-150, 2015.##
[14] T. K. Araghi, A. B. A. Manaf, M. Zamani, and S. K. Araghi, “A survey on digital image watermarking techniques in spatial and transform domains,” Int. J. Adv. Image Process. Techn.–IJIPT, vol. 3, pp. 6-10, 2016.##
[15] C. Kumar, A. K. Singh, and P. Kumar, “A recent survey on image watermarking techniques and its application in e-governance,” Multimedia Tools and Applications, vol. 77, pp. 3597-3622, 2018.##
[16] E. Ganic and A. M. Eskicioglu, “Robust DWT-SVD domain image watermarking: embedding data in all frequencies,” in Proceedings of the 2004 Workshop on Multimedia and Security, pp. 166-174, 2004.##
[17] D. Kahaner, C. Moler, and S. Nash, “Numerical methods and software,” Englewood Cliffs: Prentice Hall, 1989.##
[18] H. Andrews and C. Patterson, “Singular value decomposition (SVD) image coding,” IEEE transactions on Communications, vol. 24, pp. 425-432, 1976.##
[19] A. M. Rufai, G. Anbarjafari, and H. Demirel, “Lossy image compression using singular value decomposition and wavelet difference reduction,” Digital signal processing, vol. 24, pp. 117-123, 2014.##
[20] J. C. S. de Souza, T. M. L. Assis, and B. C. Pal, “Data compression in smart distribution systems via singular value decomposition,” IEEE Transactions on Smart Grid, vol. 8, pp. 275-284, 2017.##
[21] J. SairaBanu, R. Babu, and R. Pandey, “Parallel implementation of Singular Value Decomposition (SVD) in image compression using open Mp and sparse matrix representation,” Indian Journal of Science and Technology, vol. 8, 2015.##
[22] N. M. Makbol, B. E. Khoo, and T. H. Rassem, “Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics,” IET Image Processing, vol. 10, pp. 34-52, 2016.##
[23] N. M. Makbol and B. E. Khoo, “A new robust and secure digital image watermarking scheme based on the integer wavelet transform and singular value decomposition,” Digital Signal Processing, vol. 33, pp. 134-147, 2014.##
[24] M. Ali, C. W. Ahn, and M. Pant, “A robust image watermarking technique using SVD and differential evolution in DCT domain,” Optik-International Journal for Light and Electron Optics, vol. 125, pp. 428-434, 2014.##
[25] A. Cichocki, D. Mandic, L. De Lathauwer, G. Zhou, Q. Zhao, C. Caiafa, et al., “Tensor decompositions for signal processing applications: From two-way to multiway component analysis,” IEEE Signal Processing Magazine, vol. 32, pp. 145-163, 2015.##
[26] S. Chakraborty, S. Chatterjee, N. Dey, A. S. Ashour, and A. E. Hassanien, “Comparative approach between singular value decomposition and randomized singular value decomposition-based watermarking,” in Intelligent techniques in signal processing for multimedia security, ed: Springer, pp. 133-149, 2017.##
[27] F. Fioranelli, M. Ritchie, and H. Griffiths, “Classification of unarmed/armed personnel using the NetRAD multistatic radar for micro-Doppler and singular value decomposition features,” IEEE Geoscience and Remote Sensing Letters, vol. 12, pp. 1933-1937, 2015.##
[28] P. Moallem and N. Razmjooy, “A multi layer perceptron neural network trained by invasive weed optimization for potato color image segmentation,” Trends in Applied Sciences Research, vol. 7, p. 445, 2012.##
[29] N. Razmjooy, B. S. Mousavi, M. Khalilpour, and H. Hosseini, “Automatic selection and fusion of color spaces for image thresholding,” Signal, Image and Video Processing, vol. 8, pp. 603-614, 2014.##
[30] E. Reddy and R. Reddy, “Dynamic clipped histogram equalization technique for enhancing low contrast images,” Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, pp. 1-26, 2018.##
[31] R. A. Ghazy, A. M. Abbas, N. Al-Zubi, E. S. Hassan, N. A. El-Fishawy, M. M. Hadhoud, et al., “Block-based SVD image watermarking in spatial and transform domains,” International Journal of Electronics, vol. 102, pp. 1091-1113, 2015.##