共 10 条
- [1] Wang G.-D., Liu F.-L., Wang P., Et al., An image authentication scheme separating tamper detection from tamper location, Chinese Journal of Computers, 30, 10, pp. 1880-1888, (2007)
- [2] Wang G.-D., Liu F.-L., Liu Y., Et al., An image authentication scheme with discrimination of tampers on watermark or image, Acta Electronica Sinica, 36, 7, pp. 1349-1354, (2008)
- [3] Yang C.-W., Shen J.-J., Recover the tampered image based on VQ indexing, Signal Processing, 90, pp. 331-343, (2010)
- [4] He H.-J., Chen F., Tai H.-M., Et al., Performance analysis of a block-neighborhood based self-recovery fragile watermarking scheme, IEEE Transactions on Information Forensics And Security, 7, 1, pp. 185-196, (2012)
- [5] Chen F., He H.-J., Wang H.-X., Variable-payload self-recovery watermarking scheme for digital image authentication, Chinese Journal of Computers, 35, 1, pp. 154-162, (2012)
- [6] Jin X.-Z., Jiang W.-Z., Fragile watermarking capable of locating tampered of locating tampered blocks in JPEG images, Acta Electronica Sinica, 38, 7, pp. 1585-1589, (2010)
- [7] Lin C.Y., Chang S.F., Semi-fragile watermarking for authenticating JPEG visual content, Proceedings of the SPIE: Security and Watermarking of Multimedia Contents II, 3971, pp. 140-151, (2000)
- [8] Li B., Tao X., A new semi-fragile watermarking algorithm for image authentication, Proceeding of World Congress on Intelligent Control and Automation, pp. 5928-5932, (2008)
- [9] Li C.T., Digital fragile watermarking scheme for authentication of JPEG images, IEE Proceedings-Vision, Image, and Signal Processing, 151, 6, pp. 460-466, (2004)
- [10] Gao S.-Q., Zhang S.-J., Liu B., Et al., An image encryption algorithm based on four value chaoticarray, Chinese Journal of Image and Graphics, 11, 2, pp. 244-250, (2006)