[1] Fridrich J, Goljan M. Images with self-correcting capabilities [C]//Proceedings of IEEE International Conference on Image Processing,1999: 792-796.
[2] 付天舒,韩春杰,隋鑫. 基于DCT变换的自适应图像水印实现[J]. 光学仪器,2013, 35(3): 51-57. Fu T S, Han C J, SUI X. Adaptive image watermark realization based on DCT transform [J]. Optical Instruments, 2013, 35(3): 51-57. (in Chinese)
[3] Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153-168.
[4] Sun Q, Chang S F. A secure and robust signature scheme for JPEG2000 image authentication[J]. IEEE Transactions on Multimedia, 2005, 7(3): 480-494.
[5] Stallings W. Network security essentials: application and standards [M]. Upper Saddle River. NJ: Prentice-Hall, 2000.
[6] Vleeschouwer C D, Delaigle J F, Macq B. Invisibility and application functionalities in perceptual watermarking: an overview [J]. Proceedings of the IEEE, 2002, 90(1): 64-77.
[7] Walton S. Image authentication for a slippery new age [J]. Dr. Dobb's Journal, 1995, 20(4): 18-26.
[8] Zhang X, Wang S. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters, 2007, 14(10): 727-730.
[9] Lin P L, Hsien C K, Huang P W. A hierarchical digital watermarking method for image tamper detection and recovery [J]. Pattern Recognition, 2005, 38(12): 2519-2529.
[10] Lee T Y, Lin S D. Dual watermark for image tamper detection and recovery [J]. Pattern Recognition, 2008, 41(15): 3497-3506.
[11] 黄良永. 一种图像篡改可恢复的认证水印方法[J]. 计算机工程,2011, 37(5): 175-178. Huang L Y. Restorable authentication watermark method for image tampering [J]. Computer Engineering, 2011, 37(5): 175-178. (in Chinese)
[12] Zhang X, Wang S, Qian Z, Feng G. Reference sharing mechanism for watermark selfembedding[J]. IEEE Transactions on Image Processing, 2011,20(2): 485-495.
[13] Yang C, Shen J. Recover the tampered image based on VQ indexing [J]. Signal Processing, 2010, 90(1): 331-343.
[14] Huo Y, He H, Chen F. Alterable-capacity fragile watermarking scheme with restoration capability[J]. Optics Communications, 2012, 285(7): 1759–1766.
[15] Yang S, Qin C, Qian Z, Xu B. Tampering detection and content recovery for digital image using halftone mechanism [C]// Proceedings of the 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing,Kitakyushu,Japan, 2014: 130-133.
[16] 孙刘杰,庄松林. 印刷图像中隐藏水印的涅菲尔变换方法[J]. 上海理工大学学报,2008, 30(5): 475-478. Sun L J, Zhuang S L. Application of Fresnel holography to hiding watermark in printed image [J]. Journal of University of Shanghai for Science and Technology, 2008, 30(5): 475-478. (in Chinese)
[17] Schaefer G, Stich M. Ucid–an uncompressed color image database [C]//Proceedings of SPIE in Storage and Retrieval Methods and Applications for Multimedia,2004,5307(1): 472-480. |