参考文献 [1]Chaluvadi S B,Prasad M V N.Efficient Image Tamper Detection and Recovery Technique Using Dual Watermark[C]//Proceedings of Nature & Biologically Inspired Computing.Washington D.C.,USA:IEEE Press,2009:993-998. [2]张大兴,章建芬,韩锋.基于混沌映射的脆弱水印算法[J].杭州电子科技大学学报,2013,33(6):57-61. [3]Rawat S,Raman B.A Chaotic System Based Fragile Watermarking Scheme for Image Tamper Detection[J].AEU——International Journal of Electronics and Communications,2011,65(10):840-847. [4]Dadkhah S,Manaf A A,Sadeghi S.Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking[J].International Journal of Computer Science Issues,2012,9(1). [5]潘蓉,田玉敏,董萱.一种图像内容可恢复的脆弱水印算法[J].华中科技大学学报,2012,40(7):67-70. [6]张君捧,张庆范,杨红娟.基于块特征和混沌序列的图像篡改检测与恢复[J].山东大学学报,2014,44(6):63-69. [7]Yang C W,Shen J J.Recover the Tampered Image Based on VQ Indexing[J].Signal Process,2010,90(1):331-343. [8]Lee T Y,Lin S D.Dual Watermark for Image Tamper Detection and Recovery[J].Pattern Recognition,2008,41(11):3497-3506. [9]Chang C,Fan Y H,Tai W L.Four-scanning Attack on Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery[J].Pattern Recognition,2008,41(2):654-661. [10]Fridrich J,Goljan M,Memon N.Cryptanalysis of the Yeung Mintzer Fragile Watermarking Technique[J].Journal of Electronic Imaging,2002,11(2):262-274. [11]赵彦涛,李志全.一种改进的图像篡改和定位恢复的分层半脆弱数字水印算法[J].光电子激光,2009,20(7):104-110. [12]Tong Xiaojun,Liu Yang,Zhang Miao,et al.A Novel Chaos-based Fragile Watermarking for Image Tampering Detection and Self-recovery[J].Signal Processing,2013,28(3):301-308. [13]Li Chunlei,Wang Yunhong,Ma Bin,et al.A Novel Self-recovery Fragile Watermarking Scheme Based on Dual-redundant-ring Structure[J].Computer & Electrical Engineering,2011,37:927-940. [14]和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. [15]Wang Ling,Ye Qun,Xiao Yaoqiang,et al.An Image Encry-ption Scheme Based on Cross Chaotic Map[C]//Pro-ceedings of Image and Signal Processing.Washington D.C.,USA:IEEE Press,2008:22-26. 编辑刘冰 |