[1]
Ekici Ö, Sankur B, Akcay M. Comparative assessment of semifragile watermarking methods[J]. Journal of Electronic Imaging, 2004, 13(1): 209-216.
DOI: 10.1117/1.1633285
Google Scholar
[2]
Zhang Jing, Zhang Chuntian. Digital watermarking techniques for image authentication[J]. Journal of Image and Graphics 2003, 8(4): 367-373.
Google Scholar
[3]
Che Shengbing, Huang Da, Li Guang. Semi-fragile image watermarking algorithm based on visual features[J]. Journal on Communications, 2007, 28(10): 134-140.
Google Scholar
[4]
Tang qian. Study on semi-fragile watermarking algorithm based on edge detection[J]. Computer engineering, 2011, 37(11): 178-180.
Google Scholar
[5]
Lewis A S, Knowles G. Image compression using the 2-D wavelet transformation[J]. IEEE Transactions on Image Processing, 1992, 1(4): 244-250.
DOI: 10.1109/83.136601
Google Scholar
[6]
Wang Xiangyang, Yang Hongying, Chen Like, Zhao Hong. A new semi-fragile image watermarking based on visual masking[J]. Journal of Image and Graphics, 2005, 10(12): 1548-1553.
Google Scholar
[7]
Kundur D, Hatzinakos D. Towards a telltale watermarking technique for tamper proofing[A]. Proceedings of the IEEE International Conference on Image Processing[C], Chicago, USA, 1998, 2: 409-413.
DOI: 10.1109/icip.1998.723403
Google Scholar
[8]
Li J. Photo graphy image database[EB/OL]. http: /www. stat. psu. edu/jiali/index. download. htm.
Google Scholar
[9]
Gopalakrishnan, T.; Ramakrishnan, S.; Balasamy, K.; Murugavel, A.S.M. Semi fragile watermarking using Gaussian mixture model for malicious image attacks [C]. 2011 World Congress on Information and Communication Technologies, 2011: 120 – 125.
DOI: 10.1109/wict.2011.6141229
Google Scholar