共 38 条
[1]
Sreenivas K., Prasad V.K., Fragile watermarking schemes for image authentication: a survey, Int. J. Mach. Learn. Cybern., 9, 7, pp. 1193-1218, (2018)
[2]
Korus P., Digital image integrity-a survey of protection and verification techniques, Digit. Signal Process., 71, pp. 1-26, (2017)
[3]
Holliman M., Memon N., Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Trans. Image Process., 9, 3, pp. 432-441, (2000)
[4]
Fridrich J., Goljan M., Memon N.D., Cryptanalysis of the Yeung-Mintzer fragile watermarking technique, J. Electron. Imaging, 11, 2, pp. 262-275, (2002)
[5]
He H., Chen F., Tai H.-M., Kalker T., Zhang J., Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme, IEEE Trans. Inf. Forensics Secur., 7, 1, pp. 185-196, (2012)
[6]
Walton S., Image authentication for a slippery new age, Dr. Dobb's J., 20, 4, pp. 18-26, (1995)
[7]
Yeung M.M., Mintzer F., An invisible watermarking technique for image verification, Proceedings. International Conference on Image Processing, Vol. 2, ICIP, pp. 680-683, (1997)
[8]
Wong P.W., A watermark for image integrity and ownership verification, pp. 374-379, (1998)
[9]
Wong P.W., A public key watermark for image verification and authentication, Proceedings. International Conference on Image Processing, Vol. 1, ICIP, pp. 455-459, (1998)
[10]
Wong P.W., Memon N., Secret and public key image watermarking schemes for image authentication and ownership verification, IEEE Trans. Image Process., 10, 10, pp. 1593-1601, (2001)