Citation: | FAN Mingquan, WANG Hongxia. Fragile Watermarking Scheme with Abilities of Self-restoration and Discrimination of Tampers on Image Content or Watermark[J]. Journal of Southwest Jiaotong University, 2008, 21(6): 799-805. |
FRIDRICHJ,GOLJAN M.Images with self-correcting capahilities[C] //In Proceedings of the IEEE International Conference on Image Processing.Kobe:IEEE Press,1999:25-28.[2] TEFAS A,PITAS L.Image authentication using chaotic mixing systems[C] //Proceedings of IEEE International Conference on Circuits and Systems:Symposium.Sydeney:IEEE Press,2000:216-219.[3] WONG P W,MEMON N.Secret and public key image watermarking schemes for image authentication and ownership verification[J].IEEE Tram.on Image Processing,2001,10(10):1 593-1 601.[4] LU C S,MARK LIAO H Y.Multipurpese watermarking for image authentication and protection[J].IEEE Trans.on Image Processing,2001,10(10):1 579-1 592.[5] CELIK M U,SHARMA G,SABER E.Hierarchical watermarking for secure image authentication with localization[J].IEEE Trans.on Image Processing,2002,11(6):585-595.[6] WONG P W.A public key watermark for image verification and authentication[C] //In Proceedings of the IEEE International Conference on Image Processing.Chicago:IEEE Press,1998:455-459.[7] 和红杰,张家树,田蕾.能区分图像或水印篡改的脆弱水印方案[J].电子学报,2005,33(9):1 557-1 561.HE Hongjie,ZHANG Jiashu,TIAN Lei.A fragile watermarking scheme with discrimination of tampers on image or watermark[J].Acta Electronica Sinica,2005,33 (9):1 557-1 561.[8] 王宏霞,罗键.基于图像连通性的自适应水印同步方案[J].西南交通大学学报,2005,40(6):720-726.WANG Hongxia,LUO Jian.Selfadaptive watermarking synchronization scheme based on image connectivity[J].Journal of Southwest Jiaotong University,2005,40(6):720-726.[9] WANG Hongxia,LUO Jian.Connectivity-based watermarking robust to geometrical attacks[J].Journal of Southwest Jiaotong University,2006,14(1):1-6.[10] 和红杰,张家树.一种安全的自嵌入及篡改检测和恢复算法[J].哈尔滨工业大学学报(增刊),2006,38:889-892.HE Hongjie,ZHANG Jiashu.A secure self embedding watermarking scheme with tamper detection and restoration[J].Journal of Harbin Institute of Technology,2006,38:889-892.
|