共 76 条
[1]
Rey C(2002)A survey of watermarking algorithms for image authentication EURASIP J Appl Signal Proc 9 19-32
[2]
Dugelay J-L(2010)Content-based image authentication: current status, issues, and challenges Int J Inf Secur 32 479-496
[3]
Han S-H(2015)An overview of robust digital image watermarking IETE Tech Rev 10 1593-1601
[4]
Chu C-H(2001)Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans Image Process 41 654-661
[5]
Verma VS(2008)four-scanning attack on hierarchical digital watermarking method Pattern Recognit 7 185189-2529
[6]
Jha RK(2012)Performance analysis of a block-neighbourhood-based self-recovery fragile watermarking scheme IEEE Trans Inform Forens Secur 38 2519-3506
[7]
Wong PW(2005)A hierarchical digital watermarking method for image tamper detection and recovery Pattern Recognit 41 3497-940
[8]
Memon N(2008)Dual watermark for image tamper detection and recovery Pattern Recognit 37 927-2606
[9]
Chang C-C(2011)A novel self-recovery fragile watermarking scheme based on dual redundant-ring structure Comput Electr Eng 285 2596-1232
[10]
Fan Y-H(2012)An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and sub-block post-processing Opt Commun 6 1223-1766