참고문헌
- D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000. https://doi.org/10.1109/30.826378
- C. S. Lu and H. Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161-173, 2003. https://doi.org/10.1109/TMM.2003.811621
- H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014. https://doi.org/10.1186/1687-6180-2014-1
- S. Bekkouch and K. M. Faraoun, "Robust and reversible image watermarking scheme using combined DCTDWT-SVD transforms," Journal of Information Processing Systems, vol. 11, no. 3, pp. 406-420, 2015. https://doi.org/10.3745/JIPS.02.0021
- K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: a survey," International Journal of Machine Learning and Cybernetics, vol. 8, pp. 1-26, 2017. https://doi.org/10.1007/s13042-016-0600-5
- J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer fragile watermarking technique," Journal of Electronic Imaging, vol. 11, no. 2, pp. 262-274, 2002. https://doi.org/10.1117/1.1459449
- C. C. Chang, Y. H. Fan, and W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 2, pp. 654-661, 2008. https://doi.org/10.1016/j.patcog.2007.06.003
- M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000. https://doi.org/10.1109/83.826780
- H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking based on LBP for blind tamper detection in images," Journal of Information Processing Systems, vol. 13, no. 2, pp. 385-399, 2017. https://doi.org/10.3745/JIPS.03.0070
- Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004. https://doi.org/10.1109/TIP.2003.819861
- H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.
- O. Benrhouma, H. Hermassi, and S. Belghith, "Tamper detection and self-recovery scheme by DWT watermarking," Nonlinear Dynamics, vol. 79, no. 3, pp. 1817-1833, 2015. https://doi.org/10.1007/s11071-014-1777-3
- J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proceedings of the International Conference on Image Processing, Kobe, Japan, 1999, pp. 792-796.
- P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005. https://doi.org/10.1016/j.patcog.2005.02.007
- Y. F. Chang and W. L. Tai, "A block-based watermarking scheme for image tamper detection and self-recovery," Opto-Electronics Review, vol. 21, no. 2, pp. 182-190, 2013.
- X. J. Tong, Y. Liu, M. Zhang, and Y. Chen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery," Signal Processing: Image Communication, vol. 28, no. 3, pp. 301-308, 2013. https://doi.org/10.1016/j.image.2012.12.003
- F. Chen, H. H. He, H. M. Tai, and H. X. Wang, "Chaos-based self-embedding fragile watermarking with flexible watermark payload," Multimedia Tools and Applications, vol. 72, no. 1, pp. 41-56, 2014. https://doi.org/10.1007/s11042-012-1332-5
- D. Singh and S. K. Singh, "Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability," Journal of Visual Communication and Image Representation, vol. 38, pp. 775-789, 2016. https://doi.org/10.1016/j.jvcir.2016.04.023
- S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014. https://doi.org/10.1016/j.image.2014.09.001
- X. P. Zhang, S. Z. Wang, Z. X. Qian, and G. R. Feng, "Reference sharing mechanism for watermark selfembedding," IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 485-495, 2011. https://doi.org/10.1109/TIP.2010.2066981
- T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. https://doi.org/10.1016/j.patcog.2008.05.003
- S. Som, S. Palit, K. Dey, D. Sarkar, J. Sarkar, and K. Sarkar, "A DWT-based digital watermarking scheme for image tamper detection, localization, and restoration," in Applied Computation and Security Systems. New Delhi, India: Springer, 2015, pp. 17-37.
- F. Cao, B. W. An, J. W. Wang, D. P. Ye, and H. L. Wang, "Hierarchical recovery for tampered images based on watermark self-embedding," Displays, vol. 46, pp. 52-60, 2017. https://doi.org/10.1016/j.displa.2017.01.001
- C. Qin, P. Ji, X. P. Zhang, J. Dong, and J. W. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, 2017. https://doi.org/10.1016/j.sigpro.2017.03.033
- Z. X. Qian, G. R. Feng, X. P. Zhang, and S. Z. Wang, "Image self-embedding with high-quality restoration capability," Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011. https://doi.org/10.1016/j.dsp.2010.04.006
- Y. R. Huo, H. J. He, and F. Chen, "Alterable-capacity fragile watermarking scheme with restoration capability," Optics Communications, vol. 285, no. 7, pp. 1759-1766, 2012. https://doi.org/10.1016/j.optcom.2011.12.044
- C. Qin, H. L. Wang, X. P. Zhang, and X. M. Sun, "Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode," Information Sciences, vol. 373, pp. 233-250, 2016. https://doi.org/10.1016/j.ins.2016.09.001
- R. Eswaraiah and E. S. Reddy, "A fragile ROI-based medical image watermarking technique with tamper detection and recovery," in Proceedings of the 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 896-899.
- S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013. https://doi.org/10.1007/s10278-012-9484-4
- C. L. Li, Y. H. Wang, B. Ma, and Z. X. Zhang, "Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme," Computer Standards and Interfaces, vol. 34, no. 4, pp. 367-379, 2012. https://doi.org/10.1016/j.csi.2012.01.003