[1] Bayram S, Avcibas I, Sankur B, et al. Image manipulation detection [J]. Journal of Electronic Imaging, 2006, 15(4): 041102.[2] Zhang X P, Wang S Z. Statistical fragile watermarking capable of locating individual tampered pixels [J]. IEEE Signal Processing Letters, 2007, 14(10): 727-730.[3] He H J, Zhang J S, Chen F. A chaos-based fragile watermarking scheme with recovery [C]// Fourth International Conference on Fuzzy Systems and Knowledge Discovery. [s.l.]: IEEE, 2007: 303-307.[4] Tsai J S, Huang W B, Chen C L, et al. A featurebased digital image watermarking for copyright protection and content authentication [C]//IEEE International Conference on Image Processing. Texas: IEEE, 2007: 469-472.[5] Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication [J]. Proceedings of The IEEE, 1999, 87(7): 1167-1180.[6] Zou D K, Shi Y Q, Ni Z C, et al. A semi-fragile lossless digital watermarking scheme based on integer wavelet transform [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(10): 1294-1300.[7] Ho A T S. Semi-fragile watermarking and authentication for law enforcement applications [C]//Second International Conference on Innovative Computing Information and Control. Kumamoto: IEEE, 2007: 286.[8] Ni Z C, Shi Y Q, Ansari N, et al. Robust lossless image data hiding designed for semi-fragile image authentication [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2008, 18(4): 497-509.[9] Zhang C, Cheng L L, Qiu Z D, et al. Multipurpose watermarking based on multiscale curvelet transform [J]. IEEE Transactions on Information Forensics and Security, 2008, 3(4): 611-619[10] Proakis J G. Digital communications [M]. Zhang Lijun, Zhang Zong-cheng, Zheng Bao-yu, et al. (trans). Beijing: Publishing House of Electronics Industry, The McGraw-Hill Companies Inc., 2001: 353-355 (in Chinese). |