[1] FRIDRICH J, GOLJAN M. Protection of digital images using self embedding [C]// Proceedings of Symposium on Content Security and Data Hiding in Digital Media, NJ, USA, May.14, 1999.[2]张鸿宾,杨成. 图像的自嵌入及窜改的检测和恢复的算法[J]. 电子学报,2004, 32(2):196-199. ZHANG Hongbin, YANG Cheng, Tamper detection and self-recovery of images using self-embedding [J]. Acta Electronica Sinica, 2004, 32(2):196-199.(in Chinese) [3] ZHANG Xinpeng, WANG Shuozhong. Fragile watermarking with error-free restoration capability [J]. IEEE Transaction on Multimedia, 2008, 10(8):1490-1499.[4] LEE T Y, LIN S D. Dual watermark for image tamper detection and recovery [J], Pattern Recognition, 2008, 41(11): 3497-3506.[5] YANG C W, SHEN J J. Recover the tampered image based on VQ indexing [J]. Signal Processing, 2010, 90(1):331-343.[6] QIAN Z X, FENG G R. Inpainting assisted self recovery with decreased embedding data [J]. IEEE Signal Processing Letters, 2010, 17(11): 929-932.[7] QIAN Zhenxing, FENG G R, ZHANG Xinpeng, WANG Shuozhong. Image self-embedding with high-quality restoration capability [J]. Digital Signal Processing, 2011, 21(2):278-286.[8] KORUS P, DZIECH A. A novel approach to adaptive image authentication [C]//Proceedings of 2011 18th IEEE International Conference on Image Processing, Sept.11-14, 2011:2765–2768.[9] ZHANG Xinpeng, WANG Shuozhong. Self-embedding watermark with flexible restoration quality [J]. Multimedia Tools and Application, 2011, 54(2):385-395.[10] Zhang X P, Wang S Z. Reference sharing mechanism for watermark self-embedding [J]. IEEE Transaction on Image Processing, 2011, 20(2):485-495. [11] KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding [J]. IEEE Transaction on Image Processing, 2012, 22(3):1134-1147.[12] MacKay D J. Fountain codes [J]. IEE Proceedings Communication, 2005, 152(6):1062-1068.[13] RIVEST R L. The MD5 messages digest algorithm [OL]. http://tools.ietf.org/rfc/rfc1321.txt, 1992.[14] HOU X D, HAREL J, KOCH C. Image signature: highlighting sparse salient regions [J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 2012, 4(1):194-201.[15] The dataset from the 2nd bows contest [OL], http://bows2.ec-lille.fr/, 2007. |