Acknowledgement
This work was supported in part by the Social Science Foundation of Hunan Province (No. 19YBA098).
References
- P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE transactions on image processing, vol. 10, no. 10, pp. 1593-1601, 2001. https://doi.org/10.1109/83.951543
- F. Y. Shih and S. Y. Wu, "Combinational image watermarking in the spatial and frequency domains," Pattern Recognition, vol. 36, no. 4, pp. 969-975, 2003. https://doi.org/10.1016/S0031-3203(02)00122-X
- S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun, "Attack modelling: towards a second generation watermarking benchmark," Signal Processing, vol. 81, no. 6, pp. 1177-1214, 2001. https://doi.org/10.1016/S0165-1684(01)00039-1
- C. S. Lu, H. Y. M. Liao, and L. H. Chen, "Multipurpose audio watermarking," in Proceedings 15th International Conference on Pattern Recognition (ICPR), Barcelona, Spain, 2000, pp. 282-285. https://doi.org/10.1109/ICPR.2000.903540
- B. Lei and I. Y. Soon, "A multipurpose audio watermarking algorithm with synchronization and encryption," Journal of Zhejiang University (SCIENCE C), vol. 13, pp. 11-19, 2012. https://doi.org/10.1631/jzus.C1100085
- Y. Peng, H. Lan, M. Yue, and Y. Xue, "Multipurpose watermarking for vector map protection and authentication," Multimedia Tools and Applications, vol. 77, pp. 7239-7259, 2018. https://doi.org/10.1007/s11042-017-4631-z
- S. Sheidani and Z. Eslami, "Blind multipurpose watermarking with insertion of a single watermark: a generic construction based on verifiable threshold secret sharing," IET Image Processing, vol. 14, no. 17, pp. 4766-4773, 2020. https://doi.org/10.1049/iet-ipr.2019.1576
- F. Chaabane, M. Charfeddine, W. Puech, and C. B. Amar, "A two-stage traitor tracing scheme for hierarchical fingerprints," Multimedia Tools and Applications, vol. 76, pp. 14405-14435, 2017. https://doi.org/10.1007/s11042-016-3749-8
- University of Southern California, "The USC-SIPI image database," c2023 [Online]. Available: https://sipi.usc.edu/database/.
- H. Yang, J. Yin, and Y. Yang, "Robust image hashing scheme based on low-rank decomposition and path integral LBP," IEEE Access, vol. 7, pp. 51656-51664, 2019. https://doi.org/10.1109/ACCESS.2019.2911207
- L. Zhang and H. Wu, "Cosaliency detection and region-of-interest extraction via manifold ranking and MRF in remote sensing images," IEEE Transactions on Geoscience and Remote Sensing, vol. 60, pp. 1-17, 2022. https://doi.org/10.1109/TGRS.2021.3079441
- Z. Rahman, X. Yi, M. Billah, M. Sumi, and A. Anwar, "Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based smart home," Electronics, vol. 11, no. 7, article no. 1083, 2022. https://doi.org/10.3390/electronics11071083
- Y. Yang, X. Sun, H. Yang, and C. T. Li, "Removable visible image watermarking algorithm in the discrete cosine transform domain," Journal of Electronic Imaging, vol. 17, no. 3, article no. 033008, 2008. https://doi.org/10.1117/1.2952843