1 |
R. M. Rad, A. Attar and R. E. Atani, "A New Fast and Simple Image Encryption Algorithm Using Scan Patterns and XOR," International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 6, no. 5, pp. 275-290, 2013. DOI: http://dx.doi.org/10.14257/ijsip.2013.6.5.25
DOI
|
2 |
G. Kaur, K. Kaur, "Image Watermarking using LSB," International Journal of Advanced Research in Computer Science and Sofrware Engineering, Vol. 3, no. 4, pp. 858-861, April 2013.
|
3 |
M. Wu, B. Liu, "Watermarking for image authentication," ICIP 98, Vol. 2, pp. 437-441, October 1998.
|
4 |
http://140.127.82.166/handle/987654321/15174
|
5 |
C. M. Wu, Y. S. Shin, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections," Optics and Photonics Journal 3, pp. 103-107, 2013. DOI: http://dx.doi.org/10.4236/opj.2013.32B026
DOI
|
6 |
H. Nyeem, W. Boles and C. Boyd, "Counterfeiting Attacks on Block-Wise Dependent Fragile Watermarking Schemes" in Proc. of the 6th International Conference on Security of Information and Networks, ACM Press and Digital Library, 2013. DOI: http://dx.doi.org/10.1145/2523514.2523530
DOI
|
7 |
P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: http://dx.doi.org/10.1109/ICIP.1998.723526
DOI
|
8 |
P. L. Lin, C. K. Hsieh and P. W. Huang, "A Hierarchical Digital Watermarking Method for Image Tamper Detection and Recovery," Pattern Recognition, Vol. 38, no. 12, pp. 2519-2529, 2005. DOI: http://dx.doi.org/10.1016/j.patcog.2005.02.007
DOI
ScienceOn
|