[1] FRIDRICH J, GOLJAN M. Protection of digital images using self embedding [C]// Proceedings of Symposium on Content Security and Data Hiding in Digital Media, NJ, USA, May.14, 1999.
[2]张鸿宾,杨成. 图像的自嵌入及窜改的检测和恢复的算法[J]. 电子学报,2004, 32(2):196-199.
ZHANG Hongbin, YANG Cheng, Tamper detection and self-recovery of images using self-embedding [J]. Acta Electronica
Sinica, 2004, 32(2):196-199.(in Chinese)
[3] ZHANG Xinpeng, WANG Shuozhong. Fragile watermarking with error-free restoration capability [J]. IEEE Transaction on Multimedia, 2008, 10(8):1490-1499.
[4] LEE T Y, LIN S D. Dual watermark for image tamper detection and recovery [J], Pattern Recognition, 2008, 41(11): 3497-3506.
[5] YANG C W, SHEN J J. Recover the tampered image based on VQ indexing [J]. Signal Processing, 2010, 90(1):331-343.
[6] QIAN Z X, FENG G R. Inpainting assisted self recovery with decreased embedding data [J]. IEEE Signal Processing Letters, 2010, 17(11): 929-932.
[7] QIAN Zhenxing, FENG G R, ZHANG Xinpeng, WANG Shuozhong. Image self-embedding with high-quality restoration capability [J]. Digital Signal Processing, 2011, 21(2):278-286.
[8] KORUS P, DZIECH A. A novel approach to adaptive image authentication [C]//Proceedings of 2011 18th IEEE International Conference on Image Processing, Sept.11-14, 2011:2765–2768.
[9] ZHANG Xinpeng, WANG Shuozhong. Self-embedding watermark with flexible restoration quality [J]. Multimedia Tools and Application, 2011, 54(2):385-395.
[10] Zhang X P, Wang S Z. Reference sharing mechanism for watermark self-embedding [J]. IEEE Transaction on Image Processing, 2011, 20(2):485-495.
[11] KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding [J]. IEEE Transaction on Image Processing, 2012, 22(3):1134-1147.
[12] MacKay D J. Fountain codes [J]. IEE Proceedings Communication, 2005, 152(6):1062-1068.
[13] RIVEST R L. The MD5 messages digest algorithm [OL].
http://tools.ietf.org/rfc/rfc1321.txt, 1992.
[14] HOU X D, HAREL J, KOCH C. Image signature: highlighting sparse salient regions [J]. IEEE Transaction on Pattern Analysis and Machine Intelligence, 2012, 4(1):194-201.
[15] The dataset from the 2nd bows contest [OL],
http://bows2.ec-lille.fr/, 2007.