P. Abdul-rahman, M. Abdul-rahman, and . Piloukagreste, Spatial Data Modelling for 3D GIS An Image Adaptive, Wavelet-Based Watermarking of Digital Images DWT-SVD Based Image Watermarking Using Particle Swarm Optimizer, Proc. ICME'08, IEEE International Conference on Multimedia & Expo Bowyer, K. Chang, and P. Flynn. A Survey of Approaches and Challenges in 3D and Multi-modal 3D + 2D Face Recognition. Computer Vision & Image Understanding, pp.13-21, 1996.

S. Conde, A. Conde, and . Serrano, 3D Facial Normalization with Spin Images and Influence of Range Data Calculation over Face Verification, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), Workshops, pp.115-120, 2005.
DOI : 10.1109/CVPR.2005.379

S. Daubechies, A Chaos-Based Robust Wavelet-Domain Watermarking Algorithm A Lossy JPEG2000-Based Data Hiding Method for Scalable 3D Terrain Visualization Scalable 3D Visualization Through Reversible JPEG2000-Based Blind Data Hiding Scalable Data Hiding for Online Textured 3D Terrain Visualization An Adaptive Spread Spectrum (SS) Synchronous Data Hiding Strategy for Scalable 3D Terrain Visualization A digital watermark based on the wavelet transform and its robustness on image compression, Sweldens. Factoring Wavelet Transforms into Lifting Steps. Fourier Anal. Appl Proc. EUSIPCO'08: the 16th European Signal Processing Conference Proc. ICME'08, IEEE International Conference on Multimedia & Expo Proc. SPIE, Electronic Imaging Proc. ICIP 98. the 1998 International Conference on Image Processing Yamawaki, H. Noda, and M. Niimi. Performance Improvement of JPEG2000 Steganography Using QIM Proc. IIH-MSP '08: the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.47-541261, 1998.

. Kharrazi, ISO/IEC 15444-1: Information Technology, JPEG2000 Image Coding System, Part 1: Core Coding System. ISO Central Secretariat: CH-1211, Sencar, and N. Memon. Performance Study of Common image Steganography and Steganalysis Techniques, p.41104, 2004.

. Kong, Object watermarks for digital images and video, Kundur and Hatzinakos Proc. IEEE International Conference on Image ProcessingKundur and Hatzinakos Proc. IEEE International Conference on Acoustic, Speech and Signal Processing] D. Kundur. Improved Digital Watermarking Through Diversity and Attack Characterization Proc. ACM Workshop on Multimedia Security'99, pp.583-595, 1997.
DOI : 10.1016/j.imavis.2003.09.016

Z. Li, X. P. Li, and . Zhang, Reliable Adaptive Watermarking Scheme Integrated with JPEG2000, Proc. of 3rd International Symposium on Image and Signal Processing and Analysis, 2003.

. Lin, An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization, IEEE Trans. Multimedia, vol.10, issue.5, pp.746-757, 2008.

. Liu, A robust watermarking scheme using self-reference image, Proc. SPIE, Electronic Imaging, Security and Watermarking of Multimedia Contents III Proc. Communications and Multimedia Security Issues of The New Century, IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security, CMS '01, pp.356-367350, 2001.
DOI : 10.1016/j.csi.2005.07.001

. Noda, Bitplane decomposition steganography combined with jpeg2000 compression, IH '02: Revised Papers from the 5th International Workshop on Information Hiding, pp.295-309, 2003.

. Noore, lirmm-00416227, version 1 -13, 2007.

A. Noore, R. Singh, M. Vatsa, and M. M. Houckohyama, Enhancing security of fingerprints through contextual biometric watermarking, Proc. ICPR'08: the 19th International Conference on Pattern Recognition Pennebaker and J. L. Mitchell. JPEG: Still Image Data Compression Standard, pp.188-194, 1992.
DOI : 10.1016/j.forsciint.2006.08.019

. Piva, SELF RECOVERY AUTHENTICATION OF IMAGES IN THE DWT DOMAIN, International Journal of Image and Graphics, vol.05, issue.01, pp.149-166, 2005.
DOI : 10.1142/S0219467805001707

. Said, ]. A. Pearlman, W. A. Said, . Pearlman-]-m, D. Schlauweg et al., A new, fast, and efficient image codec based on set partitioning in hierarchical trees. Circuits and Systems for Video Technology JPEG2000-Based Secure Image Authentication Embedded Image Coding using Zerotrees of Wavelet Coefficients, Proc. MM&Sec '06: the 8th Workshop on Multimedia and Security, pp.243-250, 1993.

K. C. Su, C. J. Su, and . Kuo, Steganography in jpeg2000 compressed images, IEEE Trans. Consumer Electronics, vol.49, issue.4, pp.824-832, 2003.

. Su, An Integrated Approach to Image Watermarking and JPEG-2000 Compression, Suhail, M. S. Obaidat, S. S. Ipson, and B. Sadoun. A Comparative Study of Digital Watermarking in JPEG and JPEG, pp.35-53, 2000.

]. W. Manjunath, . S. Sweldens-]-d, M. W. Taubman, and . Marcellinuccheddu, Steganalysis of quantization index modulation data hiding The Lifting Scheme: a New Philosophy in Biorthogonal Wavelet Constructions Wavelet Applications in Signal and Image Processing JPEG2000: Image Compression Fundamentals; Standards and Practice Wavelet-Based Blind Watermarking of 3D Models, IEEE International Conference on Image Processing Proc. SPIE, Electronic Imaging Proc. MM&Sec '04: Workshop on Multimedia and Security, pp.1165-1168, 1995.

. Vatsa, Feature based RDWT watermarking for multimodal biometric system, Proc. IEEE International Conference on Acoustic, Speech and Signal Processing (IEEE ICASSP 98), pp.293-304, 1998.
DOI : 10.1016/j.imavis.2007.05.003

. Weik, Automatic creation of flexible antropomorphic models for 3D videoconferencing, Proceedings. Computer Graphics International (Cat. No.98EX149), pp.520-527, 1998.
DOI : 10.1109/CGI.1998.694305