[1]
Liu Guangqi, Zheng Xiaoshi, A tamper-resistant authentication scheme on digital image. Advances in Intelligent Systems and Computing, v 181 AISC, pp.867-872, (2013).
DOI: 10.1007/978-3-642-31698-2_122
Google Scholar
[2]
Sujatha, S.S. A novel DWT based blind watermarking for image authentication . International Journal of Network Security, v 14, n 4, pp.223-228, July 1, (2012).
Google Scholar
[3]
Weng, Li. Proceedings Robust image content authentication with tamper location. IEEE International Conference on Multimedia and Expo, pp.380-385, (2012).
DOI: 10.1109/icme.2012.163
Google Scholar
[4]
M. Holliman and N. Memon, Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, Image Processing, IEEE Transactions on, Volume: 9 Issue: 3, March (2010).
DOI: 10.1109/83.826780
Google Scholar
[5]
P.S.L. M Barreto, H. Y. Kim, and V. Rijmen, Toward secure public -key blockwise fragile authentication watermarking, Vision, Image and Signal Processing, IEE Proceedings, Volume: 149 Issue: 2, April (2010).
DOI: 10.1049/ip-vis:20020168
Google Scholar
[6]
J. Fridrich, ``Security of Fragile Authentication Watermarks with Localization, Proc. SPIE: Security and Watermarking of Multimedia Contents, Vol. 4675, pp.691-700, (2009).
DOI: 10.1117/12.465330
Google Scholar
[7]
R. Radhakrisnan and N. Memon, ``On the Security of the SARI Image Authentication System, Proc. IEEE Int. Conf. on Image Proc., Vol. III, pp.971-974, (2009).
Google Scholar
[8]
Ching-Yung Lin and Shih-Fu Chang, A robust image authentication method distinguishing JPEG compression from malicious manipulation, Circuits and Systems for Video Technology, IEEE Transactions on, Volume: 11 Issue: 2, Feb (2009).
DOI: 10.1109/76.905982
Google Scholar
[9]
M. Utku Celik, G. Sharma, E. Saber, and A. Murat Tekalp, Hierarchical watermarking for secure image authentication with localization, Image Processing, IEEE Transactions on, Volume: 11 Issue: 6, June (2008).
DOI: 10.1109/tip.2002.1014990
Google Scholar
[10]
Phen-Lan Lin, Po-Whei Huang, An-Wei Peng, A Fragile Watermarking Scheme for Image Authentication with Localization and Recover, Multimedia Software Engineering, 2007. Proceedings. IEEE Sixth International Symposium on 13-15 Dec. (2007).
DOI: 10.1109/mmse.2004.9
Google Scholar
[11]
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps., Int J Bifurcat Chaos 2008; 8(6): 1259–84.
DOI: 10.1142/s021812749800098x
Google Scholar
[12]
Chuanmu Li. An Algorithm for Removable and Robust Digital Watermarking,. Journal of Computational Information Systems 6(2010): 2069-(2076).
Google Scholar
[13]
J. Tian. Wavelet-based reversible watermarking for authentication[C]. Proc. of SPIE 2002, Security and Watermarking of Multimedia Contents III, 75(2002), 679.
DOI: 10.1117/12.465329
Google Scholar
[14]
A.M. Alattar. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. on Image Processing, Vol. 13, Aug. 2004, p.1147 – 1156.
DOI: 10.1109/tip.2004.828418
Google Scholar
[15]
A.B. Watson, G. Y. Yang, J. A. Solomon, and J. Villasenor. Visibility of wavelet quantization noise. IEEE Trans. Image Processing, vol. 6 , Aug. 1997, p.1164–1175.
DOI: 10.1109/83.605413
Google Scholar