[1] MAENO K, SUN Q, CHANG S, et al. New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization[J]. IEEE Transactions on Multimedia, 2006, 8(1): 32-45.
[2] LIN C Y, CHANG S F. A robust image authentication method distinguish JPEG compression from malicious manipulation[J]. IEEE Transaction on Circuits and Systems of Video Technology, 2001, 11(2): 153-168.
[3] LIN C H, SU T S, HSIEH W S. Semi-fragile watermarking scheme for authentication of JPEG images[J]. Tamkang Journal of Science and Engineering, 2007, 10(1): 57-66.
[4] KO C C, HUANG C H. A novel semi-fragile watermarking technique for image authentication[C]∥ Proceeding Sixth IASTED International Conference on Signal and Image Processing. Honolulu: Hawaii, 2004: 2282-2285.
[5] PIVA A, BARTOLINI F, CALDELLI R. Self-recovery authentication of images in the DWT domain[J]. International Journal of Image and Graphics, 2005, 5(1): 14965.
[6] 王向阳,陈利科.一种新的自适应半脆弱水印算法[J].自动化学报, 2007, 33(4): 361-366.
WANG Xiang-yang, CHEN Li-ke. A novel adaptive semi-fragile watermarking scheme based on image content[J]. Acta Automatica Sinica, 2007, 33(4): 361-366.
[7] 段贵多,赵希,李建平,等.一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J].电子学报, 2010, 38(4): 842-847.
DUAN Gui-duo, ZHAO Xi, LI Jian-ping, et al. A novel semi-fragile digital watermarking algorithm for image content authentication, localization and recover[J]. Chinese Journal of Electronics, 2010, 38(4): 842-847.
[8] XIAO Jun-qi, XING Xin. A quantization-based semi-fragile watermarking scheme for image content authentication[J]. Journal of Visual Communication and Image Representation, 2011, 22(2): 187-200.
[9] HOU Z X, XU N N, CHEN H, et al. Fast slant transform with sequency increment and its application in image compression[C] ∥International Conference on Signal Processing. Beijing: IEEE, 2004: 65-68.
[10] HO T S, ZHU X Z. A slant transform watermarking for copyright protection of satellite images[C] ∥Proceedings of the 2003 Joint Conference of the Fourth International Conference on Information, Communications and Signal Processing. Singapore, NTU: IEEE, 2003: 1178-1181.
[11] 车生兵,黄达,李光.基于视觉特性的半脆弱水印算法[J].通信学报,2007,28(10): 134-139.
CHE Bing-sheng, HUANG Da, LI Guang. Semi-fragile image watermarking algorithm based on visual features[J]. Journal on Communications, 2007, 28(10): 134-139.
[12] 王蓓蓓,王希常,刘江.一种面向图像内容认证的半脆弱数字水印算法[J].计算机应用研究, 2010, 27(1): 234-236.
WANG Bei-bei, WANG Xi-chang, LIU Jiang. New semi-fragile watermarking algorithm based on image content authentication[J]. Application Research of Computers, 2010, 27(1): 234236.
[13] ECKERT M P, BRADLEY A P. Perceptual quality metrics applied to still image compression[J], Signal Processing, 1998, 70(3): 177-200.
[14] 钟桦,焦李成.DCT域半易损水印技术[J].计算机学报,2005,28(9): 1549-1557.
ZHONG Hua, JIAO Li-cheng. DCT based semi-fragile watermarking technique[J]. Chinese Journal of Computers, 2005, 28(9): 1549-1557.
[15] 李剑,李生红,孙锬锋.基于Logistic混沌序列和奇异值分解的半脆弱水印算法[J].上海交通大学学报,2009,43(7): 1144-1148.
LI Jian, LI Shen-hong, SUN Tan-feng. A semi-fragile watermark scheme based on the logistic chaos sequence and singular value decomposition[J]. Journal of Shanghai Jiaotong University, 2009, 43(7): 1144-1148. |