1 |
D. Wu, X. B. Zhou and X. M. Niu, "A novel image hash algorithm resistant to print-scan," Signal Processing, vol. 89, no. 12, pp. 2415-2424, 2009.
DOI
ScienceOn
|
2 |
V. Monga and M. K. Mhcak, "Robust and secure image hashing via non-negative matrix factorizations," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 376-390, 2007.
DOI
ScienceOn
|
3 |
H. T. Sencar and N. Memon, "Overview of state-of-the-art in digital image forensics," World Scientific Press, 2007.
|
4 |
A. Swaminathan, M. Wu and K. J. R. Liu, "Digital image forensics via intrinsic fingerprints," IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 101-117, 2008.
DOI
ScienceOn
|
5 |
H. Farid, "Exposing digital forgeries from JPEG ghosts," IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154-160, 2009.
DOI
|
6 |
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no.10, pp. 1593-1601, 2001.
DOI
ScienceOn
|
7 |
S. Suthaharan, "Fragile image watermarking using a gradient image for improved localization and security," Pattern Recognition Letters, vol. 25, no. 16, pp. 1893-1903, 2004.
DOI
ScienceOn
|
8 |
H. Yang and A. C. Kot, "Binary image authentication with tampering localization by embedding cryptographic signature and block identifier," IEEE Signal Processing Letters, vol. 13, no. 12, pp. 741-744, 2006.
DOI
ScienceOn
|
9 |
J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proc. of IEEE International Conference on Image Processing, pp. 792-796, 1999.
|
10 |
H. Lu, R. Shen and F. L. Chung, "Fragile watermarking scheme for image authentication," Electronics Letters, vol. 39, no. 12, pp. 898-900, 2003.
DOI
ScienceOn
|
11 |
X. P. Zhang and S. Z. Wang, "Statistical fragile watermarking capable of locating individual tampered pixels," IEEE Signal Processing Letters, vol. 14, no. 10, pp. 727-730, 2007.
DOI
ScienceOn
|
12 |
X. P. Zhang and S. Z. Wang, "Fragile watermarking scheme using a hierarchical mechanism," Signal Processing, vol. 89, no. 4, pp. 675-679, 2009.
DOI
ScienceOn
|
13 |
X. P. Zhang and S. Z. Wang, "Fragile watermarking with error-free restoration capability," IEEE Transactions on Multimedia, vol. 10, no. 8, pp. 1490-1499, 2008.
DOI
ScienceOn
|
14 |
C. Qin, C. C. Chang and P. Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.
DOI
ScienceOn
|
15 |
H. J. He, J. S. Zhang and F. Chen, "Adjacent-block based statistical detection method for self-embedding watermarking techniques," Signal Processing, vol. 89, no. 8, pp. 1557-1566, 2009.
DOI
ScienceOn
|
16 |
Z. X. Qian and G. R. Feng, "Inpainting assisted self recovery with decreased embedding data," IEEE Signal Processing Letters, vol. 17, no. 11, pp. 929-932, 2010.
DOI
ScienceOn
|
17 |
X. P. Zhang, S. Z. Wang, Z. X. Qian and G. R. Feng, "Reference sharing mechanism for watermark self-embedding," IEEE Transactions on Image Processing, vol. 20, no. 2, pp. 485-495, 2011.
DOI
ScienceOn
|
18 |
Z. X. Qian, G. R. Feng, X. P. Zhang and S. Z. Wang, "Image self-embedding with high-quality restoration capability," Digital Signal Processing, vol. 21, no. 2, pp. 278-286, 2011.
DOI
ScienceOn
|
19 |
C. W. Yang and J. J. Shen, "Recover the tampered image based on VQ indexing," Signal Processing, vol. 90, no. 1, pp. 331-343, 2010.
DOI
ScienceOn
|
20 |
X. P. Zhang, S. Z. Wang and G. R. Feng, "Fragile watermarking scheme with extensive content restoration capability," in Proc. of the 8th International Workshop on Digital Watermark (IWDW 2009), pp. 268-278, 2009.
|
21 |
C. Qin, C. C. Chang and K. N. Chen, "Adaptive self-recovery for tampered images based on VQ indexing and inpainting," Signal Processing, vol. 93, no. 4, pp. 933-946, 2013.
DOI
ScienceOn
|
22 |
F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proceedings of the IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
DOI
ScienceOn
|
23 |
C. S. Chan and C. C. Chang, "An efficient image authentication method based on Hamming code," Pattern Recognition, vol. 40, no. 2, pp. 681-690, 2007.
DOI
ScienceOn
|
24 |
C. C. Wu, S. J. Kao and M. S. Hwang, "A high quality image sharing with steganography and adaptive authentication scheme," Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207, 2011.
DOI
ScienceOn
|
25 |
P. D. Sheba Kezia Malarchelvi, "A semi-fragile image content authentication technique based on secure hash in frequency domain," International Journal of Network Security, vol. 15, no. 5, pp. 365-372, 2013.
|
26 |
P. Y. Lin, J. S. Lee and C. C. Chang, "Dual digital watermarking for internet media based on hybrid strategies," IEEE Transactions on Circuits and Systems for Video Technology, vol. 19, no. 8, pp. 1169-1171, 2009.
DOI
ScienceOn
|
27 |
S. S. Sujatha and M. M. Sathik, "A novel DWT based blind watermarking for image authentication," International Journal of Network Security, vol. 14, no. 4, pp. 223-228, 2012.
|
28 |
A. Swaminathan, Y. N. Mao and M. Wu, "Robust and secure image hashing," IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 215-230, 2006.
DOI
ScienceOn
|