Citation: | HE Hongjie, CHEN Fan, YIN Zhongke. A New Secure Digital Camera Model Based on State Parameter[J]. Journal of Southwest Jiaotong University, 2013, 26(3): 460-466. doi: 10.3969/j.issn.0258-2724.2013.03.011 |
BIANCHI T, PIVA A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2): 87-96.
|
LUO Weiqi, QU Zhenhua, PAN Feng, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007, 1(2): 166-179.
|
BLYTHE P, FRIDRICH J. Secure digital camera[C]//Digital Forensic Research Workshop. Baltimore: [s.n.], 2004: 11-13.
|
KORUS P, DZIECH A. Efficient method for content [JP3]reconstruction with self-embedding[J]. IEEE Transactions on Image Processing, 2013, 22(3): 1134-1147.
|
HE Hongjie, CHEN Fan, TAI H M, et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196.
|
ZHANG Xinpeng, WANG Shuozhong, QIAN Zhenxing, et al. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2): 485-495.
|
陈帆,和红杰,王宏霞. 用于图像认证的变容量恢复水印算法[J]. 计算机学报,2012,35(1): 154-162.CHEN Fan, HE Hongjie, WANG Hongxia. Variable-payload self-recovery watermarking scheme for digital image authentication[J]. Chinese Journal of Computers, 2012, 35(1): 154-162.
|
MOHANTY S P. A secure digital camera architecture for integrate real-time digital rights management [J]. Journal of Systems Architecture, 2009, 55: 468-480.
|
HIEW B Y, TEOH A B, YIN O S. A secure digital camera based fingerprint verification system[J]. Journal of Visual Communication and Image Representation, 2010, 21: 219-231.
|
田新,刘曼,杨祥辉. 一种带有水印嵌入功能的数码相机: 中国,200510003430[P]. 2007-07-04.
|
FRIDRICH J, GOLJAN M, MEMON N. Cryptanalysis [JP3]of the Yeung-Mintzer fragile watermarking technique[J]. Electronic Imaging, 2002, 11(4): 262-274.
|
冯登国. 密码分析学[M]. 北京:清华大学出版社,2000: 1-3.
|
余旺科,马文平,陈和风. 分簇无线传感器网络密钥管理方案[J]. 西南交通大学学报,2011,46(2): 310-314.YU Wangke, MA Wenping, CHEN Hefeng. Key management scheme for clustered wireless sensor networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 310-314.
|
LIAN Shiguo, SUN Jinsheng, WANG Jinwei, et al. A chaotic stream cipher and the usage in video protection[J]. Chaos Solitons & Fractals, 2007, 34: 851-859.
|
刘丽,王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报,2012,47(4): 675-679.LIU Li, WANG Yongqing. Security of video hashing[J]. Journal of Southwest Jiaotong University, 2012, 47(4): 675-679.
|
魏贵民,周仲礼,许必才. 概率论与数理统计[M]. 北京:高等教育出版社,2007: 26-31.
|
ZHANG Jiashu, WANG Xiaomin. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter[J]. Physics Letters A , 2007, 362(5/6): 439-448.
|