1 |
Y.C. Hu, W.L. Chen, C.C. Lo, C.M. Wu, “A novel tamper detection scheme for BTC compressed images,” Opto-Electronics Review, vol. 21, no. 1, pp. 137-146, 2013. Article (CrossRef Link)
DOI
|
2 |
J. Mielikainen, “LSB matching revisited,” IEEE Signal Processing Letters, vol. 13, pp. 285–287, 2006. Article (CrossRef Link)
DOI
|
3 |
Y.C. Hu, C.C. Lo, W.L. Chen, C.H. Wen, “Joint image coding and image authentication based on absolute moment block truncation coding,” Journal of Electronic Imaging, vol. 22, no. 1, pp. 1-12, 2013. Article (CrossRef Link)
DOI
|
4 |
T.S. Nguyen, C.C. Chang, T.F. Chung, “A tamper-detection scheme for BTC-compressed images with high-quality images,” KSII Transactions on Internet and Information Systems, vol. 8, no. 6, pp. 2005-2021, 2014. Article (CrossRef Link)
DOI
|
5 |
M. Iwata, K. Miyake, A. Shiozaki, “Digital steganography utilizing features of JPEG images,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E87-A, pp. 929–936, 2004. Article (CrossRef Link)
|
6 |
W.J. Wang, C.T. Huang and S.J. Wang, “VQ applications in steganographic data hiding upon multimedia images,” IEEE Systems Journal, vol. 5, no. 4, pp. 528-537, 2011. Article (CrossRef Link)
DOI
|
7 |
J. Tian, “Reversible data hiding using difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp. 890-896, 2003. Article (CrossRef Link)
DOI
|
8 |
Z. Ni, Y. Q. Shi, N. Ansari, W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, pp. 354-362, 2006. Article (CrossRef Link)
DOI
|
9 |
H. J. He, J. S. Zhang, F. Chen, “Adjacent-block based statistical detection method for self-embedding watermarking techniques,” Signal Process., vol. 89, no. 8, pp. 1557–1566, 2009. Article (CrossRef Link)
DOI
|
10 |
G. J. Yu, C. S. Lu, H. Y. M. Liao, “Mean quantization-based fragile watermarking for image authentication,” Opt. Eng., vol. 40, no. 7, pp. 1396–1408, 2001. Article (CrossRef Link)
DOI
|
11 |
H. T. Lu, R. M. Shen, F. L. Chung, “Fragile watermarking scheme for image authentication,” Electron. Lett., vol. 39, no. 12, pp. 898–900, 2003. Article (CrossRef Link)
DOI
|
12 |
C. T. Li, H. Si, “Wavelet-based fragile watermarking scheme for image authentication,” J. Electron. Imaging, vol. 16, no. 1, 2007. Article (CrossRef Link)
|
13 |
A. Swaminathan, Y.N. Mao, M. Wu, “Robust and secure image hashing,” IEEE Trans. Infor. Forens. Secur., vol. 1, no. 2, pp. 215-230, 2006. Article (CrossRef Link)
DOI
|
14 |
V. Monga, M.K. Mhcak, “Robust and secure image hashing via nonnegative matrix factorizations,” IEEE Trans. Infor. Forens. Secur., vol. 2, no. 3, pp. 376–390, 2007. Article (CrossRef Link)
DOI
|
15 |
D. Wu, X.B. Zhou, X.M. Niu, “A novel image hash algorithm resistant to print-scan,” Signal Process., vol. 89, no. 12, pp. 2415–2424, 2009. Article (CrossRef Link)
DOI
|
16 |
A. Swaminathan, M. Wu, K.J.R. Liu, “Digital image forensics via intrinsic fingerprints,” IEEE Trans. Infor. Forens. Secur., vol. 3, no. 1, pp. 101–117, 2008. Article (CrossRef Link)
DOI
|
17 |
X.P. Zhang, S.Z. Wang, “Statistical fragile watermarking capable of locating individual tampered pixels,” IEEE Signal Process. Lett., vol. 14, no. 10, pp. 727–730, 2007. Article (CrossRef Link)
DOI
|
18 |
H. Farid, “Exposing digital forgeries from JPEG ghosts,” IEEE Trans. Infor. Forens. Secur., vol. 4, no. 1, pp. 154–160, 2009. Article (CrossRef Link)
DOI
|
19 |
C.S. Chan, “An image authentication method by applying Hamming code on rearranged bits,” Pattern Recognition Letters, vol. 32, no. 14, pp. 1679-1690, 2011. Article (CrossRef Link)
DOI
|
20 |
P. W. Wong, N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593-1601, 2001. Article (CrossRef Link)
DOI
|
21 |
T.Y. Lee, S.F.D. Lin, “Dual watermark for image tamper detection and recovery,” Pattern Recognition, vol. 41, no. 11, pp. 3497-3506, 2008. Article (CrossRef Link)
DOI
|
22 |
C. Qin, C.C. Chang, P.Y. Chen, “Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism,” Signal Processing, vol. 92, no. 4, pp. 1137-1150, 2012. Article (CrossRef Link)
DOI
|
23 |
J.C. Chuang, Y.C. Hu, “An adaptive image authentication scheme for vector quantization compressed image,” J. Vis. Commun. Image Represent., vol. 22, no. 5, pp. 440-449, 2011. Article (CrossRef Link)
DOI
|
24 |
C. Qin, C.C. Chang, K.N. Chen, “Adaptive self-recovery for tampered images based on VQ indexing and inpainting,” Signal Processing, vol. 93, pp. 933-946, 2013. Article (CrossRef Link)
DOI
|
25 |
V. Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.Q. Shi, “Reversible watermarking algorithm using sorting and prediction,” IEEE Trans. Circuit Syst. Video Technol., vol. 19, no. 7, pp. 989-999, 2009. Article (CrossRef Link)
DOI
|
26 |
C. C. Chang, T. S. Nguyen, C. C. Lin, “Reversible image hiding for high image quality based on histogram shifting and local complexity,” International Journal of Network and Security, vol. 16, no. 3, pp. 201-213, 2014. Article (CrossRef Link)
|
27 |
C.C. Lo, Y.C. Hu, “A novel reversible image authentication scheme for digital images,” Signal Processing, vol. 98, pp. 174-185, 2014. Article (CrossRef Link)
DOI
|
28 |
D.M. Thodi and J.J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Transactions on Image Processing, vol. 16, pp. 721-730, 2007. Article (CrossRef Link)
DOI
|
29 |
[Online]. Available: http://www.cl.cam.ac.uk/-mgk25/jbigkit. Article (CrossRef Link)
|