共 31 条
[1]
Cox I.J., Miller M.I., The first 50 years of electronic watermarking, Appl. Signal Process., 2, pp. 126-132, (2002)
[2]
Zheng-ding T., The survey of digital watermarking based image authentication techniques, In Proceedings of IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 1556-1559, (2002)
[3]
Fei C.H., Kwong H., A hypothesis testing approach to semifragile watermark-based authentication, IEEE Trans. Inf. Forensics Secur., 4, 2, pp. 479-492, (2009)
[4]
Abdel Aziz B., Performance analysis of a content authentication semifragile watermark, In Proceedings of IEEE International Conference, pp. 2055-2058, (2003)
[5]
Hsin Chang W., Chang L.-W., Semifragile watermarking for image authentication, localization, and recovery using tchebichef moments, Proceedings of IEEE International Conference on Security, 1, pp. 749-754, (2010)
[6]
Ekici O., Comparative evaluation of semi fragile watermarking algorithms, Electron. Imaging., 13, pp. 209-216, (2004)
[7]
Bo L., A new semifragile watermarking algorithm for image authentication, in Proceedings of International Conference of World Congress on Intelligent Control and Automation, Chongqing, pp. 5928-5932, (2008)
[8]
Liang X., Liang W., Zhang W., Reversible semifragile authentication watermark, In Proceedings of IEEE International Conference on Multimedia and Expo, Beijing, pp. 2122-2125, (2007)
[9]
Ni Z., Shi Y.Q., Ansari N., Su W., Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., 16, pp. 354-361, (2006)
[10]
Piva A., Caldelli R., Semifragile watermarking for still images authentication and content recovery, International Workshop on Image Analysis for Multimedia Interactive Services, Lisboa, pp. 511-515, (2004)