1 |
O. Benrhouma, H. Hermassi, and S. Belghith, "Tamper detection and self-recovery scheme by DWT watermarking," Nonlinear Dynamics, vol. 79, no. 3, pp. 1817-1833, 2015.
DOI
|
2 |
J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proceedings of the International Conference on Image Processing, Kobe, Japan, 1999, pp. 792-796.
|
3 |
P. L. Lin, C. K. Hsieh, and P. W. Huang, "A hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 38, no. 12, pp. 2519-2529, 2005.
DOI
|
4 |
Y. F. Chang and W. L. Tai, "A block-based watermarking scheme for image tamper detection and self-recovery," Opto-Electronics Review, vol. 21, no. 2, pp. 182-190, 2013.
|
5 |
X. J. Tong, Y. Liu, M. Zhang, and Y. Chen, "A novel chaos-based fragile watermarking for image tampering detection and self-recovery," Signal Processing: Image Communication, vol. 28, no. 3, pp. 301-308, 2013.
DOI
|
6 |
F. Chen, H. H. He, H. M. Tai, and H. X. Wang, "Chaos-based self-embedding fragile watermarking with flexible watermark payload," Multimedia Tools and Applications, vol. 72, no. 1, pp. 41-56, 2014.
DOI
|
7 |
D. Singh and S. K. Singh, "Effective self-embedding watermarking scheme for image tampered detection and localization with recovery capability," Journal of Visual Communication and Image Representation, vol. 38, pp. 775-789, 2016.
DOI
|
8 |
S. Dadkhah, A. A. Manaf, Y. Hori, A. E. Hassanien, and S. Sadeghi, "An effective SVD-based image tampering detection and self-recovery using active watermarking," Signal Processing: Image Communication, vol. 29, no. 10, pp. 1197-1210, 2014.
DOI
|
9 |
X. P. Zhang, S. Z. Wang, Z. X. Qian, and G. R. Feng, "Reference sharing mechanism for watermark selfembedding," IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 485-495, 2011.
DOI
|
10 |
T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008.
DOI
|
11 |
S. Som, S. Palit, K. Dey, D. Sarkar, J. Sarkar, and K. Sarkar, "A DWT-based digital watermarking scheme for image tamper detection, localization, and restoration," in Applied Computation and Security Systems. New Delhi, India: Springer, 2015, pp. 17-37.
|
12 |
F. Cao, B. W. An, J. W. Wang, D. P. Ye, and H. L. Wang, "Hierarchical recovery for tampered images based on watermark self-embedding," Displays, vol. 46, pp. 52-60, 2017.
DOI
|
13 |
C. Qin, P. Ji, X. P. Zhang, J. Dong, and J. W. Wang, "Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy," Signal Processing, vol. 138, pp. 280-293, 2017.
DOI
|
14 |
Z. X. Qian, G. R. Feng, X. P. Zhang, and S. Z. Wang, "Image self-embedding with high-quality restoration capability," Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011.
DOI
|
15 |
Y. R. Huo, H. J. He, and F. Chen, "Alterable-capacity fragile watermarking scheme with restoration capability," Optics Communications, vol. 285, no. 7, pp. 1759-1766, 2012.
DOI
|
16 |
D. C. Lou and J. L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Transactions on Consumer Electronics, vol. 46, no. 1, pp. 31-39, 2000.
DOI
|
17 |
C. Qin, H. L. Wang, X. P. Zhang, and X. M. Sun, "Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode," Information Sciences, vol. 373, pp. 233-250, 2016.
DOI
|
18 |
R. Eswaraiah and E. S. Reddy, "A fragile ROI-based medical image watermarking technique with tamper detection and recovery," in Proceedings of the 4th International Conference on Communication Systems and Network Technologies, Bhopal, India, 2014, pp. 896-899.
|
19 |
S. C. Liew, S. W. Liew, and J. M. Zain, "Tamper localization and lossless recovery watermarking scheme with ROI segmentation and multilevel authentication," Journal of Digital Imaging, vol. 26, no. 2, pp. 316-325, 2013.
DOI
|
20 |
C. L. Li, Y. H. Wang, B. Ma, and Z. X. Zhang, "Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme," Computer Standards and Interfaces, vol. 34, no. 4, pp. 367-379, 2012.
DOI
|
21 |
C. S. Lu and H. Y. M. Liao, "Structural digital signature for image authentication: an incidental distortion resistant scheme," IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161-173, 2003.
DOI
|
22 |
M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432-441, 2000.
DOI
|
23 |
H. Nyeem, W. Boles, and C. Boyd, "Digital image watermarking: its formal model, fundamental properties and possible attacks," EURASIP Journal on Advances in Signal Processing, vol. 2014, no. 1, pp. 1-22, 2014.
DOI
|
24 |
S. Bekkouch and K. M. Faraoun, "Robust and reversible image watermarking scheme using combined DCTDWT-SVD transforms," Journal of Information Processing Systems, vol. 11, no. 3, pp. 406-420, 2015.
DOI
|
25 |
K. Sreenivas and V. K. Prasad, "Fragile watermarking schemes for image authentication: a survey," International Journal of Machine Learning and Cybernetics, vol. 8, pp. 1-26, 2017.
DOI
|
26 |
J. Fridrich, M. Goljan, and N. Memon, "Cryptanalysis of the Yeung-Mintzer fragile watermarking technique," Journal of Electronic Imaging, vol. 11, no. 2, pp. 262-274, 2002.
DOI
|
27 |
C. C. Chang, Y. H. Fan, and W. L. Tai, "Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 2, pp. 654-661, 2008.
DOI
|
28 |
H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking based on LBP for blind tamper detection in images," Journal of Information Processing Systems, vol. 13, no. 2, pp. 385-399, 2017.
DOI
|
29 |
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600-612, 2004.
DOI
|
30 |
H. Zhang, C. Y. Wang, and X. Zhou, "Fragile watermarking for image authentication using the characteristic of SVD," Algorithms, vol. 10, no. 1, article no. 27, 2017.
|