1 |
Dongho Won, Modern Cryptology, Green Press, 2006.
|
2 |
Digital Signature Mechanism with Appendix -Part2:Korean Certificate-based Digital Signature Algorithm KCDSA, TTA Standard, 2014.
|
3 |
P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: http://dx.doi.org/10.1109/ICIP.1998.723526
|
4 |
Chanil Woo, Seungdae Lee, "Digital Watermarking for Image Tamper Detection using Block-Wise Technique" International Journal of Smart Home, Vol, 7, no. 5, pp. 115-124, 2013. DOI: http://dx.doi.org/10.14257/ijsh.2013.7.5.12
DOI
|
5 |
G. Kaur, K. Kaur, "Image Watermarking using LSB," International Journal of Advanced Research in Computer Science and Sofrware Engineering, Vol. 3, no. 4, pp. 858-861, April 2013.
|
6 |
C. M. Wu, Y. S. Shin, "A Simple Image Tamper Detection and Recovery Based on Fragile Watermark with One Parity Section and Two Restoration Sections," Optics and Photonics Journal 3, pp. 103-107, 2013. DOI: http://dx.doi.org/10.4236/opj.2013.32B026
DOI
|