Acknowledgement
Supported by : 서일대학교
References
- P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," Proc. of IEEE Conference on Image Processing, pp. 425-429, 1998.
- P. L. Lin, C. K. Hsieh, P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery" Pattern Recognition 38, pp. 2519-2529, 2005. DOI: http://dx.doi.org/10.1016/i.patcog.2005.02.007
- G. Kaur, K. Kaur, "Image Watermarking using LSB," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 4, pp. 858-861, April 2013.
- C. M. Wu, Y. S.Shin, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermarkwith One Parity Section and Two Restoration Sections," Optics and Photonics Journal 3, pp. 103-107, 2013. DOI: http://dx.doi.org/10.4236/opi.2013.32B026
- H. Nyeem, W. Boles and C. Boyd, "Counterfeiting Attacks on Block-Wise Dependent Fragile Watermarking Schemes" Proc. of the 6th International Conference on Security of Information and Networks, ACM Press and Digital Library, 2013. DOI: http://dx.doi.org/10.1145/2523514.2523530
- C. I. Woo, S. D. Lee, "Digital Watermarking for Image Tamper Detection using Block-Wise Technique" International Journal of Smart Home, vol. 7, no. 5, pp.115-124, 2013. DOI: http://dx.doi.org/10.14257/ijsh.2013.7.5.12