[1] Zhu B B,Swanson M D,Tewfik A H.When seeing isn't believing multimedia authentication technologies[J].IEEE Signal Processing Magazine,2004,3:40-49. [2] Wong P W.A public key watermark for image verification and authentication[C]//Proc.of the IEEE International Conference on Image Processing,Chicago,IL,1998:455-459. [3] Holliman M,Memon N.Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes[J].IEEE Trans.on Image Process.,2000,9(3):432-441. [4] Fridrich J,Goljan M,Baldoza A C.New fragile authentication watermark for images[C]//Proc,of the IEEE International Conference on Image Processing,Vancouver,BC,Canada,2000:10-13. [5] Celik M U,Sharma G,Saber E,et al.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans.on Image Process.,2002,11(6):585-594. [6] Fridrich J,Goljan M.Images with self-correcting capabilities[C]//Proc.of the IEEE International Conference on Image Processing,Kobe,Japan,1999,3:792-796. [7] 张鸿宾,杨成.图像的自嵌入及窜改的检测和恢复算法[J].电子学报,2004,32(2):196-199. [8] 和红杰,张家树.基于混沌置乱的分块自嵌入水印算法[J].通信学报,2006,27(7):80-86. [9] 钱振兴,程义民,王以孝,等.一种图像自嵌入方法[J].电子学报,2006,34(7):1347-1350. [10] Yeh F H,Lee G C.Total fragile watermarking for localizing and recovering tampered image[C]//Proc,of International Symposium on Intelligent Signal Processing and Communication Systems,2005:321-324. [11] Yeh F H,Lee G C.Content-based watermarking in image authentication allowing remedying of tampered images[J].Optical Engineering,2006,45:077004-1-077004-10. [12] 郑江滨,冯大淦,张艳宁,等.可恢复的脆弱数字图像水印[J].计算机学报,2004,27(3):371-376. [13] Lan T,Mansour M F,Tewfik A H.Fraud detection and self embedding[C]//Proc,of the 7th ACM Int.Conf.On Multimedia,Orlando,FL,USA,1999,2:33-36. [14] Lan T,Tewfik A.Robust high capacity data embedding[C]//Proc.of the IEEE International Conference on Image Processing,Vancouver,BC,Canada,2000,1:581-584. [15] Lin C Y,Chang S F.SARI:Self-authentication-and recovery image watermarking system[C]//Proc,of ACM Multimedia,Ottawa,Canada,2001:628-629. [16] Lin P L,Hsieh C K,Huang P W.A hierarchical digital watermarking method for image tamper detection and recovery[J].Pattern Recognition,2005,38(12):2519-2529. [17] Sang J,Alam M S,Zhu X.On the security of a fragile digital image watermarking scheme[C]//Proc,of the IASTED International Conference on Graphics and Visualization in Engineering,Clearwater,Florida,USA,2007:53-57. [18] Zhao D,Chen G,Liu W.A chaos-based robust wavelet-domain watermarking algorithm[J].Chaos,Solitons and Fractals,2004,22(1):47-54. [19] 上海交通大学数学系编.概率论与数理统计[M].2版.科学出版社,2007:15-16. |