[1] Jain A K, Uludag U. Hiding fingerprint minutiae in images[C]//Proceedings of Automatic Identification Advanced Technologies, New York, 2002:97-102.
[2] 张毅刚,焦玉华,牛夏牧,俞龙江. 基于指纹特征数字水印算法的身份认证技术研究[J]. 电子学报,2003, 31(12A):2131-2134. Zhang Y G, Jiao Y H, Niu X M, Yu L J. Authentication based on fingerprint feature watermarking algorithm[J]. Acta Electronica Sinica, 2003, 31(12A):2131-2134. (in Chinese)
[3] 蔡龙飞,赵慧民,方艳梅. 一种公钥密码体制下指纹识别与数字水印的身份认证协议[J]. 中山大学学报(自然科学版),2013, 52(4):51-57. Cai L F,Zhao H M,Fang Y M. An identity authentication protocol of the public key infrastructure combining fingerprint identification with digital watermarking[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2013, 52(4):51-57. (in Chinese)
[4] Ashokarajan R, Angelinjosphia R, Gayathri P, Rajendran T. A novel approach for secure ATM transactions using fingerprint watermarking[C]//IEEE Conference on Advanced Computing, Chennai, 2013:547-552.
[5] Zebbiche K, Khelifi F. Efficient wavelet-based perceptual watermark masking for robust fingerprint image watermarking[J]. IET Image Processing, 2014, 8(1):23-32.
[6] Lin E T, Delp E J. A review of fragile image watermarks[C]//Multimedia and Security Workshop, Orlando, 1999:25-29.
[7] 宋玉杰,谭铁牛. 基于脆弱性数字水印的图象完整性验证研究[J]. 中国图象图形学报,2003, 8(1):4-10. Song Y J, Tan T N. A brief review on fragile watermarking based image authentication[J]. Journal of Image and Graphics, 2003, 8(1):4-10. (in Chinese)
[8] Chang C C, Chen K N, Lee C F. A secure fragile watermarking scheme based on chaos-andhamming code[J]. Journal of Systems and Software, 2011, 84(9):1462-1470.
[9] 王国栋,刘粉林,刘媛,姚刚. 一种能区分水印或内容篡改的脆弱水印算法[J]. 电子学报,2008, 36(7):1349-1354. Wang G D, Liu F L, Liu Y, Yao G. An image authentication scheme with discrimination of tampers on watermark or image[J]. Acta Electronica Sinica, 2008, 36(7):1349-1354. (in Chinese)
[10] 金喜子,姜文哲. 块级篡改定位的JPEG图像脆弱水印[J]. 电子学报,2010, 38(7):1585-1589. Jin X Z, Jiang W Z. Fragile watermarking capable of locating tampered blocks in JPEG images[J]. Acta Electronica Sinica, 2010, 38(7):1585-1589. (in Chinese)
[11] 和红杰,张家树. 基于混沌置乱的分块自嵌入水印算法[J]. 通信学报,2006, 27(7):80-86. He H J, Zhang J S. Chaos-based scramble self-embedding watermarking algorithm[J]. Journal on Communications, 2006, 27(7):80-86. (in Chinese)
[12] 和红杰,张家树. 基于混沌的自嵌入安全水印算法[J]. 物理学报,2007, 56(6):3092-3100. He H J, Zhang J S. A chaos-based self-embedding secure watermarking algorithm[J]. Acta Physica Sinica, 2007, 56(6):3092-3100. (in Chinese)
[13] Hu H T, Hsu L Y. Robust, transparent and high-capacity audio watermarking in DCT domain[J]. Signal Processing, 2015, 109(4):226-235.
[14] 彭玉楼,何怡刚. 基于小波和混沌映射的函数水印算法[J]. 仪器仪表学报,2011, 31(12):2768-2773. Peng Y L, He Y G. Functional watermarking algorithm based on wavelet transform and chaotic map[J]. Chinese Journal of Scientific Instrument, 2011, 31(12):2768-2773. (in Chinese)
[15] Akhaee M A, Sahraeian S M E, Marvasti F. Contourlet-based image watermarking using optimum detector in a noisy environment[J]. IEEE Transactions on Image Processing, 2010, 19(4):967-980.
[16] Tianyu Y E, Niu X X, Yang Y X. Fragile authentication watermark based on singular value decomposition and chaotic mapping[J]. Opto-electronic Engineering, 2008, 35(9):138-144.
[17] 杨卫民,蔡键. 一种自嵌入的图像脆弱水印算法[J]. 小型微型计算机系统,2011, 32(1):169-172. Yang W M, Cai J. Image fragile watermarking algorithm of self-embedding[J]. Journal of Chinese Computer Systems, 2011, 32(1):169-172. (in Chinese)
[18] 刘东彦,刘文波,张弓. 图像内容可恢复的半脆弱水印技术研究[J]. 中国图象图形学报,2010, 15(1):20-25. Liu D Y, Liu W B, Zhang G. Research of recoverable semi-fragile watermarking for image content[J]. Journal of Image and Graphics, 2010, 15(1):20-25. (in Chinese)
[19] 李娟. 离散小波变换和正交三角分解相融合的图像水印算法[J]. 激光杂志,2015, 36(9):72-76. Li J. An audio watermarking algorithm based on DWT-QR[J]. Laser Journal, 2015, 36(9):72-76. (in Chinese)
[20] 尹义龙,宁新宝,张晓梅. 改进的指纹细节特征提取算法[J]. 中国图象图形学报,2002, 7(12):1302-1306. Yin Y L, Ning X B, Zhang X M. An improved algorithm for minutiae extraction in fingerprint images[J]. Journal of Image and Graphics, 2002, 7(12):1302-1306. (in Chinese) |