References
- G. J. Yu, C. S. Lu, H. Y. M. Liao, “Mean quantization-based fragile watermarking for image authentication,” Opt. Eng., vol. 40, no. 7, pp. 1396–1408, 2001. Article (CrossRef Link) https://doi.org/10.1117/1.1384885
- H. T. Lu, R. M. Shen, F. L. Chung, “Fragile watermarking scheme for image authentication,” Electron. Lett., vol. 39, no. 12, pp. 898–900, 2003. Article (CrossRef Link) https://doi.org/10.1049/el:20030589
- C. T. Li, H. Si, “Wavelet-based fragile watermarking scheme for image authentication,” J. Electron. Imaging, vol. 16, no. 1, 2007. Article (CrossRef Link)
- H. J. He, J. S. Zhang, F. Chen, “Adjacent-block based statistical detection method for self-embedding watermarking techniques,” Signal Process., vol. 89, no. 8, pp. 1557–1566, 2009. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2009.02.009
- A. Swaminathan, Y.N. Mao, M. Wu, “Robust and secure image hashing,” IEEE Trans. Infor. Forens. Secur., vol. 1, no. 2, pp. 215-230, 2006. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2006.873601
- V. Monga, M.K. Mhcak, “Robust and secure image hashing via nonnegative matrix factorizations,” IEEE Trans. Infor. Forens. Secur., vol. 2, no. 3, pp. 376–390, 2007. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2007.902670
- D. Wu, X.B. Zhou, X.M. Niu, “A novel image hash algorithm resistant to print-scan,” Signal Process., vol. 89, no. 12, pp. 2415–2424, 2009. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2009.05.016
- A. Swaminathan, M. Wu, K.J.R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Infor. Forens. Secur., vol. 3, no. 1, pp. 101–117, 2008. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2007.916010
- H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Trans. Infor. Forens. Secur., vol. 4, no. 1, pp. 154–160, 2009. Article (CrossRef Link) https://doi.org/10.1109/TIFS.2008.2012215
- P. W. Wong, N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001. Article (CrossRef Link) https://doi.org/10.1109/83.951543
- X.P. Zhang, S.Z. Wang, “Statistical fragile watermarking capable of locating individual tampered pixels,” IEEE Signal Process. Lett., vol. 14, no. 10, pp. 727–730, 2007. Article (CrossRef Link) https://doi.org/10.1109/LSP.2007.896436
- T.Y. Lee, S.F.D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. Article (CrossRef Link) https://doi.org/10.1016/j.patcog.2008.05.003
- C.S. Chan, “An image authentication method by applying Hamming code on rearranged bits,” Pattern Recognition Letters, vol. 32, no. 14, pp. 1679-1690, 2011. Article (CrossRef Link) https://doi.org/10.1016/j.patrec.2011.07.023
- C. Qin, C.C. Chang, P.Y. Chen, “Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism,” Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2011.11.013
- J.C. Chuang, Y.C. Hu, “An adaptive image authentication scheme for vector quantization compressed image,” J. Vis. Commun. Image Represent., vol. 22, no. 5, pp. 440-449, 2011. Article (CrossRef Link) https://doi.org/10.1016/j.jvcir.2011.03.011
- C. Qin, C.C. Chang, K.N. Chen, “Adaptive self-recovery for tampered images based on VQ indexing and inpainting,” Signal Processing, vol. 93, pp. 933-946, 2013. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2012.11.013
- Y.C. Hu, W.L. Chen, C.C. Lo, C.M. Wu, “A novel tamper detection scheme for BTC compressed images,” Opto-Electronics Review, vol. 21, no. 1, pp. 137-146, 2013. Article (CrossRef Link) https://doi.org/10.2478/s11772-013-0078-6
- Y.C. Hu, C.C. Lo, W.L. Chen, C.H. Wen, “Joint image coding and image authentication based on absolute moment block truncation coding,” Journal of Electronic Imaging, vol. 22, no. 1, pp. 1-12, 2013. Article (CrossRef Link) https://doi.org/10.1117/1.JEI.22.1.013012
- T.S. Nguyen, C.C. Chang, T.F. Chung, “A tamper-detection scheme for BTC-compressed images with high-quality images,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 2005-2021, 2014. Article (CrossRef Link) https://doi.org/10.3837/tiis.2014.06.011
- M. Iwata, K. Miyake, A. Shiozaki, “Digital steganography utilizing features of JPEG images,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, pp. 929–936, 2004. Article (CrossRef Link)
- J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, pp. 285–287, 2006. Article (CrossRef Link) https://doi.org/10.1109/LSP.2006.870357
- W.J. Wang, C.T. Huang and S.J. Wang, “VQ applications in steganographic data hiding upon multimedia images,” IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011. Article (CrossRef Link) https://doi.org/10.1109/JSYST.2011.2165603
- J. Tian, “Reversible data hiding using difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003. Article (CrossRef Link) https://doi.org/10.1109/TCSVT.2003.815962
- Z. Ni, Y. Q. Shi, N. Ansari, W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006. Article (CrossRef Link) https://doi.org/10.1109/TCSVT.2006.869964
- C. C. Chang, T. S. Nguyen, C. C. Lin, “Reversible image hiding for high image quality based on histogram shifting and local complexity,” International Journal of Network and Security, vol. 16, no. 3, pp. 201-213, 2014. Article (CrossRef Link)
- C.C. Lo, Y.C. Hu, “A novel reversible image authentication scheme for digital images,” Signal Processing, vol. 98, pp. 174-185, 2014. Article (CrossRef Link) https://doi.org/10.1016/j.sigpro.2013.11.028
- D.M. Thodi and J.J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, pp. 721-730, 2007. Article (CrossRef Link) https://doi.org/10.1109/TIP.2006.891046
- V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuit Syst. Video Technol., vol. 19, no. 7, pp. 989-999, 2009. Article (CrossRef Link) https://doi.org/10.1109/TCSVT.2009.2020257
- [Online]. Available: http://www.cl.cam.ac.uk/-mgk25/jbigkit. Article (CrossRef Link)