[1]
SHEN Changxiang, ZHANG Huangguo, FENG Dengguo, et al. Survey of information security[J]. Science in China Series F: Information Sciences, 2007, 50(3): 273 -298.
Google Scholar
[2]
XIAO Ming-song, WAN Xiao-xia, GAN Chao-hua, et al. A robust DCT domain watermarking algorithm based on chaos system[C] /Proc of SPIE. 2009: 7495-7499).
DOI: 10.1117/12.832994
Google Scholar
[3]
ZHONG Qian-chuan, ZHU Qing-xin. A DCT domain color watermarking scheme based on chaos and multilayer Arnold transformation[C] /Proc of International Conference on Networking and Digital Society. 2009: 209-212.
DOI: 10.1109/icnds.2009.132
Google Scholar
[4]
ALVAREZ G, LI Shu-jun. Some basic cryptographic requirements for chaos-based[J]. International Journal of Bifurcation and Chaos 2006, 16(8) : 2129-2151.
DOI: 10.1142/s0218127406015970
Google Scholar
[5]
NI Rong-rong, RUAN Qiu-qi, ZHAO Yao. Pinpoint authentication watermarking based on a chaotic system[J]. Forensic Science International, 2008, 179(1): 54-62.
DOI: 10.1016/j.forsciint.2008.04.016
Google Scholar
[6]
LIU Shao-hui, YAO Hong-xun, GAO Wen, et al. An image fragile watermark scheme based on chaotic image pattern and pixel-pair[J]. Applied Mathematics and Computation, 2007, 185(1): 869-882.
DOI: 10.1016/j.amc.2006.07.036
Google Scholar
[7]
GAO Tie-gang, GU Qiao-lun, EMMANUEL S. A novel image authentication scheme based on hyper-chaotic cell neural network[J]. Chaos, Solitons and Fractals, 2009, 42(1): 548-553.
DOI: 10.1016/j.chaos.2009.01.017
Google Scholar
[8]
TONG Ming, HU Jia, JI Hongbing. An adaptive digital image watermark algorithm based on gray2scale morphology [J ]. Journal of Electronics (China), 2009, 26(3): 417-422.
DOI: 10.1007/s11767-008-0100-1
Google Scholar
[9]
HAN Feng-ling, HU Jian-kun, YU Xing-huo, et al. Fingerprint images encryption via multi-scroll chaotic attractors[J]. Applied Mathematics and Computation, 2007, 185(1): 931-939.
DOI: 10.1016/j.amc.2006.07.030
Google Scholar