[1] Celik M, Sharma G, Saber E, et al. Hierarchical Water- marking for Secure Image Authentication with Localization[J]. IEEE Transactions on Image Processing, 2002, 11(6): 585-595. [2] 吴金海, 林福宗. 基于数字水印的图像认证技术[J]. 计算机学报, 2004, 27(9): 1153-1161. [3] Liu Shaohui, Yao Hongxun, Gao Wen, et al. An Image Fragile Watermark Scheme Based on Chaotic Image Pattern and Pixel-pairs[J]. Applied Mathematics and Computation, 2007, 185(2): 869-882. [4] Dogan S, Tuncer T, Avci E, et al. A Robust Color Image Watermarking with Singular Value Decomposition Method[J]. Advances in Engineering Software, 2011, 42(6): 336-346. [5] Zhang Xinpeng, Wang Shuozhong. Fragile Watermarking with Error-free Restoration Capability[J]. IEEE Transactions on Multimedia, 2008, 10(8): 1490-1499. [6] Zhang Xinpeng, Wang Shuozhong, Qian Zhenxing, et al. Reference Sharing Mechanism for Watermark Self- embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2): 485-495. [7] He Hongjie, Zhang Jiashu, Chen Fan. Adjacent-block Based Statistical Detection Method for Self-embedding Watermarking Techniques[J]. Signal Processing, 2009, 89(8): 1557-1566. [8] Chen Weiche, Wang Mingshi. A Fuzzy C-means Clustering- based Fragile Watermarking Scheme for Image Authenti- cation[J]. Expert Systems with Applications, 2009, 36(2): 1300-1307. [9] Xu Dawen, Wang Rangding, Wang Jicheng. A Novel Watermarking Scheme for H.264/AVC Video Authentica- tion[J]. Signal Processing: Image Communication, 2011, 26(6): 267-279. [10] Chen Siyue, Leung H. Chaotic Watermarking for Video Authentication in Surveillance Applications[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(5): 704-709.
|