1 |
D. Xiao and F. Y. Shih, “An improved hierarchical fragile watermarking scheme using chaotic sequence sorting and subblock post-processing,” Optics Communications, vol. 285, pp. 2596-2606, 2012.
DOI
|
2 |
D. Vaishnavi and T. S. Subashini, “Robust and Invisible Image Watermarking in RGB Color Space Using SVD,” Procedia Computer Science, vol. 46, pp. 1770-1777, 2015.
DOI
|
3 |
D. Vaishnavi and T. S. Subashini, “Image Tamper Detection based on Edge Image and Chaotic Arnold Map,” Indian Journal of Science and Technology, vol. 8, pp. 548-555, Mar. 2015.
DOI
|
4 |
F. Di Martino and S. Sessa, “Fragile Watermarking Tamper Detection with Images Compressed by Fuzzy Transform,” Inf. Sci., vol. 195, pp. 62-90, Jul. 2012.
DOI
|
5 |
R. C.-W. Phan, “Tampering with a watermarking-base dimage authentication scheme,” Pattern Recognition, vol. 41, pp. 3493-3496, 2008.
DOI
|
6 |
S. S. Bedi, G. S. Tomar, and S. Verma, “Robust watermarking of image in the transform domain using edge detection,” in Computer Modelling and Simulation, 2009. UKSIM’09. 11th International Conference on, 2009, pp. 233-238.
|
7 |
S. Shivani, D. Singh, and S. Agarwal, “DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme,” in Pattern Recognition and Image Analysis, Springer, 2013, pp. 640-647.
|
8 |
D. M. N. G. P. Dr.S.A.K.Jilani Manickam.L, “A Novel Fragile Watermarking Scheme For Image Tamper Detection Using K Mean Clustering,” International Journal of Computer Trends and Technology(IJCTT), vol. 4, pp. 3380-3385, 2013.
|
9 |
L. Sumalatha, V. V. Krishna, and A. V. Babu, “Image Content Authentication based on Wavelet Edge Features,” International Journal of Computer Applications, vol. 50, 2012.
|
10 |
D. Zhang, Z. Pan, and H. Li, “A contour-based semi-fragile image watermarking algorithm in DWT domain,” in Education Technology and Computer Science (ETCS), 2010 Second International Workshop on, 2010, vol. 3, pp. 228-231.
|
11 |
S. Shan, “Logistic map-based fragile watermarking for pixel level tamper detection and resistance,” EURASIP Journal on Information Security, vol. 2010, 2010.
|
12 |
W.-C. Chen and M.-S. Wang, “A fuzzy c-means clustering-based fragile watermarking scheme for image authentication,” Expert Systems with Applications, vol. 36, pp. 1300-1307, 2009.
DOI
|
13 |
C.-C. Chang, K.-N. Chen, C.-F. Lee, and L.-J. Liu, “ A secure fragile watermarking scheme based on chaos-and-hamming code,” Journal of Systems and Software, vol. 84, pp. 1462-1470, 2011.
DOI
|
14 |
M. Sui and J. Li, “The medical volume data watermarking using arnold scrambling and 3D-DWT,” in Mechatronic Sciences, Electric Engineering and Computer (MEC), Proceedings 2013 International Conference on, 2013, pp. 1120-1124.
|
15 |
S. Rawat and B. Raman, “A chaotic system based fragile watermarking scheme for image tamper detection,” AEU-International Journal of Electronics and Communications, vol. 65, pp. 840-847, 2011.
DOI
|