共 62 条
[1]
Matsuo T(2004)On parallel hash functions based on block-ciphers IEICE Trans Fundam Electron Commun Comput Sci 87 67-74
[2]
Kurosawa K(2005)Oblivious signature based envelope Distrib Comput 17 293-302
[3]
Li N(1997)An invisible watermarking technique for image verification Proc IEEE Int Conf Image Process 2 680-683
[4]
Wenliang D(2001)Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Trans Image Process 10 1593-1601
[5]
Boneh D(2004)Fragile image watermarking using a gradient image for improved localization and security Pattern Recogn Lett 25 1893-1903
[6]
Yeung MM(2003)Structural digital signature for image authentication: an incidental distortion resistant scheme IEEE Trans Multimed 5 161-173
[7]
Mintzer F(1995)Information authentication for a slippery new age Dr Dobbs J 20 18-26
[8]
Wong PW(2007)An image fragile watermark scheme based on chaotic image pattern and pixel-pairs Appl Math Comput 185 869-882
[9]
Memon N(2006)Digital watermarking scheme exploiting nondeterministic dependence for image authentication Opt Eng 45 127001-446
[10]
Suthaharan S(2006)A watermarking-based image ownership and tampering authentication scheme Pattern Recogn Lett 27 439-1307