(1)
A Survey on Watermarking Different Techniques and Attacks. IJERAT 2016, 2 (1), 01-07.