1 |
M. Rabbani and P. W. Jones, Digital Image Compression Techniques, SPIE, 1991.
|
2 |
E. J. Delp and O. R. Mitchell, "Image compression using block truncation coding," IEEE Transactions on Communications, vol. 27, no. 9, pp. 1335-1342, Sept. 1979.
DOI
|
3 |
M. D. Lema and O. R. Mitchell, "Absolute moment block truncationcoding and its application to color image," IEEE Transactions on Communications, vol. 32, no. 10, pp. 1148-1157, Oct. 1984.
DOI
|
4 |
P. Franti, O. Nevalainen, and T. Kaukoranta, "Compression of digital images by block truncation coding: a survey," The Computer Journal, vol. 37, no. 4, pp. 308-332, 1994.
DOI
ScienceOn
|
5 |
A. Haouzia and R. Noumeir, "Methods for image authentication: a survey," Multimedia Tools and Applications, vol. 39, no. 1, pp. 1-46, Aug. 2008.
DOI
|
6 |
P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, Oct. 2001.
DOI
ScienceOn
|
7 |
C. Y. Lin and S. F. Chang, "A robust image authentication method distinguish JPEG compression from malicious manipulation," IEEE Transactions on Circuits and Systems for Video Technology, vol. 11, no. 2, pp. 153-168, Feb. 2001.
DOI
ScienceOn
|
8 |
W. N. Lie, G. S. Lin, and S. L. Chen, "Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques," IEEE Transactions on Information Forensics and Security, vol. 1, no. 3, pp. 330-341, Sept. 2006.
DOI
ScienceOn
|
9 |
T. Y. Lee and S. D. Lin, "Dual watermark for image tamper detection and recovery," Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, Nov. 2008.
DOI
ScienceOn
|
10 |
F. Ahmed and M. Y. Siyal, "A secure and robust hash-based scheme for image authentication," Signal Processing, vol. 90, no. 5, pp. 1456-1470, 2010.
DOI
ScienceOn
|
11 |
J. C. Chuang and Y. C. Hu, "An adaptive image authentication scheme for vector quantization compressed image," Journal of Visual Communication and Image Representation, vol. 22, no. 5, pp. 440-449, Jul. 2011.
DOI
ScienceOn
|
12 |
X. Qi and X. Xin, "A quantization-based semi-fragile watermarking scheme for image content authentication," Journal of Visual Communication and Image Representation, vol. 22, no. 2, pp. 187-200, Feb. 2011.
DOI
ScienceOn
|
13 |
Y. C. Hu, C. C. Lo, W. L. Chen, and C. H. Wen, "Joint image coding and image authentication based on absolute moment block truncation coding" Journal of Electronic Imaging, vol. 22, no. 1, 2013.
|
14 |
T. Matsuo and K. Kurosawa, "On parallel hash functions based on block-ciphers," IEICE transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, no. 1, pp 67-74, 2004.
|
15 |
J. Fridrich, M. Goljan, and R. Du, "Invertible authentication," in Proc. of SPIE 4314, Security and Watermarking of Multimedia Contents III, San Jose, CA, Jan. 2001.
|
16 |
M. Goljan, J. Fridrich, and R. Du, "Distortion-free data embedding for images," in Proc. of 4th Int. Workshop on Information Hiding, pp 27-41, 2001.
|
17 |
A. van Leest, M. van der Veen, and F. Bruekers, "Reversible image watermarking," in Proc. of 2003 Int. Conf. on Image Processing, vol. 3, pp 731-734, Step. 2003.
|
18 |
H. Guo, Y. Li, A. Liu, and S. Jajodi, "A fragile watermarking scheme for detecting malicious modifications of database relations," Information Sciences, vol. 176, no. 10, pp. 1350-1378, 2006.
DOI
ScienceOn
|
19 |
C. Qin, C. C. Chang, and P. Y. Chen, "Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism," Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012.
DOI
ScienceOn
|
20 |
X. Zhang, S.Wang, and G. Feng, "Fragile watermarking scheme with extensive content restoration capability," in Proc. of the 8th Int. Workshop on Digital Watermarking, pp. 268-278, 2009.
|
21 |
Anthony T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, " Fragile watermarking based on encoding of the zeros of the transform," IEEE Transactions on Information Forensic and Security, vol. 3, no. 3, pp. 567-569, Sept. 2008.
DOI
ScienceOn
|
22 |
J. Fridrich, "Image watermarking for tamper detection," in Proc. of 1998 Int. Conf. on Image Processing, vol. 2, pp. 404-408, 1998.
|
23 |
J. Fridrich, M. Goljan and A. C. Baldoza, "New fragile authentication watermark for images," in Proc. of 2000 Int. Conf. on Image Processing, vol. 1, pp. 446-449, Sept. 2000.
|
24 |
G. Friedman, "The trustworthy digital camera: restoring credibility to the photographic image," IEEE Transactions on Consumer Electronics, vol. 39, no. 4, pp. 905-910, 1993.
DOI
ScienceOn
|
25 |
M. Schneider and S. F. Chang, "A robust content based digital signature for image authentication," in Proc. of 1996 Int. Conf. on Image Processing, vol. 3, pp 227-230, Sept. 1996.
|
26 |
J. Fridrich and M. Goljan, "Images with self-correcting capabilities," in Proc. of 1999 Int. Conf. on Image Processing, vol. 3, pp. 792-796, Oct. 1999.
|
27 |
A. Harry, VDM Specification of The MD4 Message Digest Algorithm, National Physical Laboratory, Teddington, 1992.
|