[1]
|
J. Fridrich, “Security of Fragile Authentication Water-Marks with Localization,” Proceedings of SPIE 4675, Security and Watermarking of Multimedia Contents IV, Vol. 691, 2002, pp. 691-700. doi:10.1117/12.465330
|
[2]
|
H. J. He, F. Chen, H.-M. Tai, T. Kalker and Jiashu Zhang, “Performance Analysis of A Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme,” IEEE Transactions on Information Forensics and Security, Vol.7, No.1, 2012, pp.185-196.
doi:10.1109/TIFS.2011.2162950
|
[3]
|
T.-Y. Lee, S. F. Lin and D. Dual, “Watermark for Image Tamper Detection and Recovery,” Pattern Recognition, Vol.41, No.11, 2008, pp. 3497-3506.
doi:10.1016/j.patcog.2008.05.003
|
[4]
|
P. L. Lin, C.-K. Hsieh and P.-W. Huang, “A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery,” Pattern Recognition, Vol.38, No.12, 2005, pp. 2519-2529.
doi:10.1016/j.patcog.2005.02.007
|
[5]
|
M. Utku Celik, G. Sharma, E. Saber and A. Murat Tekalp, “Hierarchical Watermarking for Secure Image Authentication with Localization,” IEEE Transactions on Image Processing, Vol. 11, No.6, 2002, pp. 585-595.
doi:10.1109/TIP.2002.1014990
|
[6]
|
X. P. Zhang and S. Z. Wang, “Fragile Watermarking with Error-Free Restoration Capability,” IEEE Transactions on Multimedia, Vol.10, No.8, pp. 1490-1499, 2008. doi:10.1109/TMM.2008.2007334
|
[7]
|
X. P. Zhang and S. Z. Wang, “Statistical Fragile Watermarking Capable of Locating Individual Tampered Pixels,” IEEE Signal Processing Letters, Vol.14, No.10, 2007, pp. 727-730.doi:10.1109/LSP.2007.896436
|