[1] Fridrich J, Goljan M. Images with self-correcting capabilities[C]//Proceedings of IEEE International Conference on Image Processing, 1999:792-796.[2] Qian Z X, Feng G R. Inpainting assisted self-recovery with decreased embedding data[J]. IEEE Signal Processing Letters, 2010, 17(11):929-932.[3] 马左红,华文深,李晓明,张悦.基于双随机相位加密技术的图像隐藏方法[J].光学仪器, 2012, 34(4):21-25. Ma Z H, Hua W S, Li X M, Zhang Y. Image hiding method based on double random phase encryption technology[J]. Optical Instruments, 2012, 34(4):21-25. (in Chinese)[4] 付天舒,韩春杰,隋鑫.基于DCT变换的自适应图像水印实现[J].光学仪器, 2013, 35(3):51-57. Fu T S, Han C J, Sui X. Adaptive image watermark realization based on DCT transform[J]. Optical Instruments, 2013, 35(3):51-57. (in Chinese)[5] 杨杉杉,秦川,徐伯庆.一种基于安全隐藏的图像分层篡改检测和内容恢复算法[J].计算机应用研究, 2015, 2:507-511. Yang S S, Qin C, Xu B Q. Fragile watermarking based on secure embedding for hierarchical tampering detection and content recovery[J]. Computer Application and Research, 2015, 2:507-511. (in Chinese)[6] Suthaharan S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16):1893-1903.[7] Walton S. Image authentication for a slippery new age[J]. Dr Dobb's Journal, 1995, 20(4):18-26.[8] Chang C C, Hu Y S, Lu T C. A watermarking-based image ownership and tampering authentication scheme[J]. Pattern Recognition Letters, 2006, 27(5):439-446.[9] He H J, Chen F, H. Tai M, Kalker T, Zhang J S. Performance analysis of a blockneighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):185-196.[10] Qin C, Chang C C, Chen K N. Adaptive self-recovery for tampered images based on VQ indexing and inpainting[J]. Signal Processing, 2013, 93(4):933-946.[11] Qin C, Chang C C, Chen P Y. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012, 92(4):1137-1150.[12] Korus P, Dziech A. Adaptive self-embedding scheme with controlled reconstruction performance[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2):169-181.[13] Korus P, Dziech A. Efficient method for content reconstruction with self-embedding[J]. IEEE Transactions on Image Processing, 2013, 22(3):1134-1147.[14] Lin P L, Hsieh C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery[J]. Pattern Recognition, 2005, 38(12):2519-2529.[15] Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506.[16] Zhang X P, Wang S Z, Qian Z X. Self-embedding watermark with flexible restoration quality[J]. Multimedia Tools and Applications, 2011, 54(2):385-395.[17] Zhang X P, Wang S Z, QianZ X, Feng G R. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2):485-495.[18] Yang C, Shen J. Recover the tampered image based on VQ indexing[J]. Signal Processing, 2010, 90(1):331-343.[19] Gray R M. Vector quantization[J]. IEEE ASSP Magazine, 1984, 1(2):4-29.[20] Linde Y, Buzo A, Gray R M. An algorithm for vector quantizer design[J]. IEEE Transactions on Communication, 1980, 28(1):84-95.[21] Canny J. A computational approach to edge detection[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1986, 8(6):679-698. |