참고문헌
- G. C. Langelaar, I. Setyawan, and R. L. Lagendijk, "Watermarking digital image and video data: A state-of-the-art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000. https://doi.org/10.1109/79.879337
- H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: Its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014. https://doi.org/10.1186/1687-6180-2014-1
- T. Hai, C. M. Li, J. M. Zain, and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, no. 1, pp. 122-138, 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
- K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: A survey," International Journal of Machine Learning and Cybernetics, pp. 1-26, 2017. https://doi.org/10.1007/s13042-017-0641-4
- S. Walton, "Information authentication for a slippery new age," Dr. Dobb's Journal, vol. 20, no. 4, pp. 18-26, 1995.
- S. H. Liu, H. X, Yao, W. Gao, and Y. L. Liu, "An image fragile watermark scheme based on chaotic image pattern and pixel-pairs," Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007. https://doi.org/10.1016/j.amc.2006.07.036
- S. Rawat and B. Raman, "A chaotic system based fragile watermarking scheme for image tamper detection," AEU - International Journal of Electronics and Communications, vol. 65, no. 10, pp. 840-847, 2011. https://doi.org/10.1016/j.aeue.2011.01.016
- L. Teng, X. Y. Wang, and X. K. Wang, "Cryptanalysis and improvement of a chaotic system based fragile watermarking scheme," AEU - International Journal of Electronics and Communications, vol. 67, no. 6, pp. 540-547, 2013. https://doi.org/10.1016/j.aeue.2012.12.001
- W. Y. Zhang and F. Y. Shih, "Semi-fragile spatial watermarking based on local binary pattern operators," Optics Communications, vol. 284, no. 16-17, pp. 3904-3912, 2011. https://doi.org/10.1016/j.optcom.2011.04.004
- J. D. Chang, B. H. Chen, and C. S. Tsai, "LBP-based fragile watermarking scheme for image tamper detection and recovery," in Proceedings of the IEEE International Symposium on Next-Generation Electronics, Kaohsiung, Taiwan, 2013, pp. 173-176.
- O. Benrhouma, H. Hermassi, A. A. A. El-Latif, and S. Belghith, "Chaotic watermark for blind forgery detection in images," Multimedia Tools and Applications, vol. 75, no. 14, pp. 8695-8718, 2016. https://doi.org/10.1007/s11042-015-2786-z
- R. O. Preda, "Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain," Measurement, vol. 46, no. 1, pp. 367-373, 2013. https://doi.org/10.1016/j.measurement.2012.07.010
- T. Ojala, M. Pietikainen, and D. Harwood, "A comparative study of texture measures with classification based on feature distributions," Pattern Recognition, vol. 29, no. 1, pp. 51-59, 1996. https://doi.org/10.1016/0031-3203(95)00067-4
- Z. P. Dan, Y. F. Chen, Z. Yang, and G. Wu, "An improved local binary pattern for texture classification," Optik, vol. 125, no. 20, pp. 6320-6324, 2014. https://doi.org/10.1016/j.ijleo.2014.08.003
- B. Yang and S. C. Chen, "A comparative study on local binary pattern (LBP) based face recognition: LBP histogram versus LBP image," Neurocomputing, vol. 120, pp. 365-379, 2013. https://doi.org/10.1016/j.neucom.2012.10.032
- H. Shi, X. H. Wang, M. C. Li, J. Bai, and B. Feng, "Secure variable-capacity self-recovery watermarking scheme," Multimedia Tools and Applications, vol. 76, no. 5, pp. 6941-6972, 2017. https://doi.org/10.1007/s11042-016-3328-z
- G. Bhatnagar and B. Raman, "A new robust reference watermarking scheme based on DWT-SVD," Computer Standards and Interfaces, vol. 31, no. 5, pp. 1002-1013, 2009. https://doi.org/10.1016/j.csi.2008.09.031
- H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.