[1] C. M. Pun, “A Novel DFT-Based Digital Watermarking System for Images”, In 8th Int.Conf. on Signal Processing (ISP), vol. 2, pp. 1–6, November 2006.##
[2] M. D. Swanson, M. Kobayashi, and A. H. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” Proc. of the IEEE, vol. 86, no. 6, pp. 1064-1087, 1998.##
[3] C. I. Podilchuk, and E. J. Delp, “Digital Watermarking: Algorithms and Applications,” Signal Processing Magazine, IEEE, vol. 18, no. 4, pp. 33–46, 2001.##
[4] I. J. Cox, and M. L. Miller, “The First 50 Years of Electronic Watermarking,” EURASIP Journal on Applied Signal Processing (JASP), pp. 126–132, 2002.##
[5] S. J. Lee, and S. H. Jung, “A Survey of Watermarking Techniques Applied to Multimedia,” IEEE Int. Symp. in Industrial Electronics (ISIE), vol. 1, pp. 272–277, 2001.##
[6] T. E. Areef, H. S. Heniedy, and O. O. Mansour, “Optimal Transform Domain Watermark Embedding via Genetic Algorithms,” In ITI 3rd Int. Conf. on Information and Communications Technology (IICT), pp. 607–617, 2005.##
[7] S. C. Chu, H. C. Huang, Y. Shi, S. Y. Wu, and C. S. Shieh, “Genetic Watermarking for Zerotree-Based Applications,” Circuits, Systems & Signal Processing (CSSP), vol. 27, no. 2, pp. 171–182, 2008.##
[8] H. J. Lee, J. H. Park, and Y. Zheng, “Digital Watermarking Robust against JPEG Compression,” Information Security, pp. 167-177, November 1999.##
[9] L. Liu, “A Survey on Digital Watermarking Technologies,” Department of Electrical and Computer Engineering, State University of New York at Stony Brook, pp. 11794–12350, 2005.##
[10] R. B. Wolfgang, and E. J. Delp, “A watermark for digital images,” Int. Conf. on Image Processing (IIP), vol. 3, pp. 219–222, September 1996.##
[11] R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, “Perceptual Watermarks for Digital Images and Video,” Proc. of the IEEE, vol. 87, no. 7, pp. 1108–1126, 1999.##
[12] G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, “Watermarking Digital Image and Video Data. A State-of-the-Art Overview,” IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20–46, 2000.##
[13] S. D. Lin, S. C. Shie, and J. Y. Guo, “Improving the Robustness of DCT-based Image Watermarking against JPEG Compression,” Computer Standards & Interfaces, vol. 32, no. 1–2, pp. 54–60, 2010.##
[14] R. Pareek, and P. K. Ghosh, “Discrete Cosine Transformation based Image Watermarking for Authentication and Copyright Protection,” Int. J. of Engineering and Advanced Technology(IJEAT), vol. 1, no. 3, pp. 152–156, 2012.##
[15] C. I. Podilchuk, and W. Zeng, “Digital Image Watermarking using Visual Models,” Electronic Imaging, Int.Society for Optics and Photonics, pp. 100–111, 1997.##
[16] J. Wu, and J. Xie, “Adaptive Image Watermarking Scheme Based on HVS and Fuzzy Clustering Theory” Int. Conf. on Neural Networks and Signal Processing(INNSP), vol. 2, pp. 1493–1496, December 2003.##
[17] S. E. El-Khamy, and N. A. El-Yamany, “A New Perceptual Image Watermarking Technique based on Adaptive Fuzzy Clustering,” Radio Science Conf, pp. 1–8, March 2004.##
[18] N. Zhong, J. M. Kuang, and Z. W. He, “A GA-based optimal image watermarking technique,” Third Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, vol. 1, pp. 291–294, November 2007.##
[19] V. Aslantas, S. Ozer, and S. Ozturk, “A Novel Image Watermarking Method Based on Discrete Cosine Transform using Genetic Algorithm,” IEEE 17th Conf. on Signal Processing and Communications Applications (SPCA), pp. 285–288, April 2009.##
[20] I. Usman, and A. Khan, “BCH coding and Intelligent Watermark Embedding: Employing both Frequency and Strength Selection,” Applied Soft Computing, vol. 10, no. 1, pp. 332–343, 2010.##
[21] C. C. Lai, “A Digital Watermarking Scheme Based on Singular Value Decomposition and Tiny Genetic Algorithm,” Digital Signal Processing, vol. 21, no. 4, pp. 522–527, 2011.##
[22] P. Artameeyanant, “Tabu Searching for Watermarking Robust Against Compression and Cropping,” Int. Joint Conf., pp. 4461-4463, October 2006.##
[23] H. C. Huang, J. S. Pan, F. H. Wang, and C. S. Shieh, “Robust Image Watermarking with Tabu Search Approaches,” IEEE Int. Symposium on Consumer Electronics, Sydney, October 2003.##
[24] M. R. Fatahi, H. Ghaneiy, and A. M. L. Latif, “A New Approach to Selecting Waterwark in Digital Images Based On Competitive Colonization Algorithm,” J. of Symptom and Data Processing (JSDP), pp. 1-14, 2013 (In Persian).##
[25] A. Mohammadi, and H. Ghaneiy, “Improve Robustness and Transparency on Watermarking Digital Images Using Multipling of Domains Torque in the Discrete Cosine Transform,” 1 Int. Conf. on New Research Achievements in Electrical & Computer Engineering (IECE), 2016 (In Persian).##
[26] F. Beiki, and H. Ghaneiy, “Providing Away to Improve the Strenght and Capacity of Digital Image Watermarking Systems,” 3 Int. Conf. on Pattern Recognition & Image Analysis(IPRIA), 2017 (In persian)##
[27] F. Hasan, and B. Alireza, “Improved Watermarking Systebased on Discrete Fourier Transform and Fuzzy Logic,” J. of Soft Computing and Information Technology(JSCIT), pp. 1-13. 2015 (In persian).##
[28] X. Zhou, C. Cao, J. Ma, and L. Wang, “Adaptive Digital Watermarking Scheme Based on Support Vector Machines and Optimized Genetic Algorithm,” Mathematical Problems in Engineering, 2018.##
[29] R. A. Alotaibi, and L. A. Elrefaei, “Text-image Watermarking Based on Integer Wavelet Transform (IWT) and Discrete Cosine Transform (DCT),” Applied Computing and Informatics, vol. 15, no. 2, pp. 191-202, 2019.##
[30] S. M. R. Mousavi, and A. R. Naghsh, “Robust Digital Image Watermarking Method Using Graph-Based Transform (GBT) and Genetic Algorithm (GA),” J. of Intelligent Procedures in Electrical Technology (JIPET), vol. 10, no. 39, pp. 13-22, 2019 (In persian).##
[31] J. H. Holland, “An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence,” Adaptation in Natural and Artificial Systems, First Edition, The University of Michigan, USA ,1975.##
[32] F. W. Glover, and G. A. Kochenberger, “Handbook of Metaheuristics,” Springer Science & Business Media, vol. 57, 2003.##