[1]
I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, T. Kalker, Digital Watermarking and Steganography, Second Edition, p.375, (2008).
DOI: 10.1016/b978-012372585-1.50014-0
Google Scholar
[2]
C. -Y. Lin and S. -F. Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, p.153–168, Feb. (2001).
DOI: 10.1109/76.905982
Google Scholar
[3]
P. W. Wong, A watermark for image integrity and ownership verification, in Proceedings of IS&T PIC Conference, (Portland, OR), May (1998).
Google Scholar
[4]
P. W. Wong, A public key watermark for image verification and authentication, in Proceedings of ICIP, (Chicago, IL), October (1998).
Google Scholar
[5]
P. W. Wong and N. Memon, Secret and Public Key Image Watermarking Schemes for Image Authentication and Ownership Verification, IEEE Transactions on Image Processing, vol. 10, no. 10, p.1593–601, (2001).
DOI: 10.1109/83.951543
Google Scholar
[6]
J. Fridrich and M. Goljan, Protection of Digital images Using Self-Embedding, Symposium on Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, (1999).
Google Scholar
[7]
J. Fridrich and M. Goljan. Images with Self-correcting Capabilities, in Proceedings of the IEEE International Conference on Image Processing, volume 3, p.792–796, (1999).
DOI: 10.1109/icip.1999.817228
Google Scholar
[8]
K. Ke, T. Zhao & O. Li, A Restorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark, 4th International Conference on Multimedia and Ubiquitous Engi-neering(MUE), pp.1-5, (2010).
DOI: 10.1109/mue.2010.5575077
Google Scholar
[9]
A. T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, Fragile Watermarking Based on Encoding of the Zeroes of the z-Transform, IEEE Transactions on Information Forensics and Secu-rity, Vol: 3, Issue: 3, pp: 567-569, (2008).
DOI: 10.1109/tifs.2008.926994
Google Scholar
[10]
J. Xiao, Z. Ma, B. Lin, J. Su, Y. Wang, A semi-fragile watermarking distinguishing JPEG compression and gray-scale-transformation from malicious manipulation, IEEE Youth Conference on Information Computing and Telecommunications, (2010).
DOI: 10.1109/ycict.2010.5713080
Google Scholar
[11]
D. Zou, Y.Q. Shi, Z. Ni, W. Su, A Semi-Fragile Lossless Digital Watermarking Scheme Based on Integer Wavelet Transform, IEEE Transactions on Circuits and Systems for Video Technology, (2006).
DOI: 10.1109/tcsvt.2006.881857
Google Scholar
[12]
F. B. Coelho, J. S. Barbar, G. S. B. do Carmo, The Use of Watermark and Hash Function for the Authentication of Digital Images Mapped through the use of the Wavelet Transform, Second International Conference on Internet and Web Applications and Services, (2007).
DOI: 10.1109/iciw.2007.62
Google Scholar