1 |
P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: http://dx.doi.org/10.1109/ICIP.1998.723526
|
2 |
Yoo, Heung-Ryol, Son, Yung-Deug, "Fragile Watermark System using Quantization and DC Coefficients", Journal of IKEEE, Vol. 22, No. 3, pp. 774-779, 2018. DOI: https://doi.org/10.7471/ikeee.2018.22.3.774
DOI
|
3 |
P. MeenakshiDevi, M. Venkatesan and K. Duraiswamy, "A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform", Journal of Computer Science, Vol. 5, No. 11, pp. 831-837, 2009. DOI: https://doi.org/10.3844/jcssp.2009.831.837
DOI
|
4 |
A.Kannammal, S.Subha Rani, "Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain", International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, pp. 181-189, 2011.
|
5 |
S. Dadkhah, A. Abd Manaf and S. Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, pp. 1-8, 2012.
|
6 |
Heng Zhang, Chengyou Wang, and Xiao Zhou, "Fragile Watermarking Based on LBP for Blind Tamper Detection in Images", Journal of Information Processing Systems, Vol. 13, No. 2, pp. 385-399, 2017. DOI: https://doi.org/10.3745/JIPS.03.0070
DOI
|
7 |
M. A. Hajjaji, S. Ajili, A. Mtibaa, E. Bourennane, "Fragile Method for Watermarking of Medical Image: Method Based LSBs", International Journal of Sciences and Techniques of Automatic control & computer engineering IJ-STA, Vol. 6, No. 1, pp. 1764-1781, 2012.
|
8 |
P. Rahmati, A. Adler, T. Tran, " Watermarking in E-commerce", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 6, pp. 256-265, 2013 DOI: https://doi.org/10.14569/ijacsa.2013.040634
|