[1] FRIDRICH J, GOLJAN M. Images with self-correcting capabilities [C]//Proceedings of IEEE International Conference on Image Processing, 1999[2] ZHANG Xinpeng, WANG Shuozhong, FENG Guorui. Fragile watermarking scheme with extensive content restoration capability [C]//Proceedings of International Workshop on Digital Watermarking, 2009.[3] CHEDDAD A, CONDELL J, Curran Kevin, Kevitt P. Mc. A secure and improved self-embedding algorithm to combat digital document forgery [J]. Signal Processing, 2009, 89: 2324-2332.[4] ZHANG Xinpeng, WANG Shuozhong. Fragile watermarking with error free restoration capability [J]. IEEE Transactions on Multimedia, 2008, 10( 8): 补页码 .[5] ZHANG Xinpeng, WANG Shuozhong, FENG Guorui. Reference sharing mechanism for watermark self-embedding [J]. IEEE Transactions on Image Processing, 2011, 20(2): 485-495/[6] KORUS P, DZIECH A.. A novel approach to adaptive image authentication [C]//Proceedings of IEEE International Conference on Image Processing, 2011. 补页码[7] QIAN Zhenxing., FENG Guorui, ZHANG Xinpeng, WANG Shuozhong. Image self-embedding with high-quality restoration capability [J], Digital Signal Processing, 2011, 21( 2): 278-286.[8] Korus PAWEL K, Dziech ANDRZEJ D. Efficient method for content reconstruction with self-embedding [J]. IEEE Transactions on Signal Processing, 2013, 22(3): 1134-1146.[9] MacKay D J C. Fountain codes [J]. IEE Proceedings Communication, 2005, 152( 6) 补页码 .[10] LUBY M. Lt codes [C]//Proc. 43rd Ann. IEEE Symp. on Foundations of Computer Science, 2002:16-19.[11] Shapiro Jerome M. Embedded image coding using zerotrees of wavelet coefficients [J], IEEE Transactions on Signal Processing, vol. 41, no. 12. 1993[12] FAN Z, de QUEIROZ R. Identi?cation of bitmap compression history: JPEG detection and quantizer estimation [J]. IEEE Transactions on Image Processing, 2003, 12(2): 230-235. |