References
- I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Second Edition, p. 375, 2008
- C.-Y. Lin and S.-F. Chang, "A robust image authentication method distinguishing JPEG compression from malicious manipulation", IEEE Trans. Circuits Syst. Video Techmol., vol. 11, no. 2, pp. 153-168, Feb. 2001. https://doi.org/10.1109/76.905982
- P. W. Wong, "A watermark for image integrity and ownership verification", in Proceedings of IS&T PIC Congerence, (Portland, OR), May 1998
- P. W. Wong, "A public key watermark for image verigication and authentication", in Proceedings of ICIP, (Chicago, IL), October 1998
- P. W. Wong and N. Memon, "Secret and Public Key Image Watermarking, Schemes for Image Authentication and Ownership Verification", IEEE Transactions on Image Processing, Vol. 10, no. 10, pp. 1593 - 601. 2001 https://doi.org/10.1109/83.951543
- J. Fridrich and M. Goljan, Protection of Digital images Using Self-Emvedding", Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, 1999
- J. Fridrich and M. Goljan, "Images with Self-correcting Capabilities," in Proceedings of the IEEE International Conference on Image Processing, volume 3, pp. 792-796, 1999
- K. Ke, T. Zhao & O. Li, "A Restoorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark", 4th International Conference on Multimedia and Ubiquitous Engi-neering (MUE), pp. 1-5, 2010
- A. T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, "Fragile Watermarking Based on Eneoding of the Zeroes of the z-Transform", IEEE Transactions on Information Forensics and Security, Vol: 3, Issue:3, pp. 567-569, 2008 https://doi.org/10.1109/TIFS.2008.926994
- C. H. Lin, C. Y. Yang, "Multipurpose Watermarking Based on Blind Vector Quantization (BVQ)", Journal of Information Hiding, and Multimedia Signal Processing, Volume 2, Number 3, July 2011
- J. Xiao, Z. Ma, B. Lin, J. Su, Y. Wang, "A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation", IEEE Youth Conference on Information Computing and Telecommunications, 2010
- D. Zou, Y.Q. Shi, Z. Ni, W. Su, "A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform", IEEE Transactions on Circuits and Systems for Video Technology, 2006
- F. B. Coelho, J. S. Barbar, G. S. B. do Carmo, "The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through tne use of the Wavelet Transform", Second International Conference on Internet and Web Applications and Services, 2007
- C-C Chang, C-C Lin, Y-S Hu, "An SVD Oriented Warermark Embedding Scheme with High Qualities for the Restored Image", Infornational Journal of Innovative Computing, Information and Control, Volume 3, Number 3, June 2007
- D. Kundur and D Hatzinakos, "Digital Watermarking for Telltale Tamper-Proofing and Authentication", Proceedings of the IEEE, Volume: 87, Issue:7, July 1999
- C. Fei, D. Kundur and R. Kwong, "A Hypothesis Testing Approach for Achieving Semi-fragility in Multimedia Authentication". IEEE Transactions on Information Forensics and Security, Volume 4, Issue 2, June 2009