1 |
I. J. Cox, J. Kilian, F. T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Transactions on image processing, Vol. 6, No. 12, pp. 1673-1687, 1997.
DOI
|
2 |
P. W. Wong, "A Public Key Watermark for Image Verification and Authentication," in Proc. of IEEE Conf. on Image Processing, pp. 425-429, 1998. DOI: https://dx.doi.org/10.1109/ICIP.1998.723526
DOI
|
3 |
R. Halder, S. Sengupta, S. Ghosh, D. Kundu, "A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique," IOSR Journal of Computer Engineering(IOSR-JCE), Vol. 18, Issue 1, Ver. IV, pp. 39-43, 2016.
|
4 |
Yoo, Heung-Ryol, Son, Yung-Deug, "Fragile Watermark System using Quantization and DC Coefficients", Journal of IKEEE, Vol. 22, No. 3, pp. 774-779, 2018. DOI: https://doi.org/10.7471/ikeee.2018.22.3.774
DOI
|
5 |
P. MeenakshiDevi, M. Venkatesan and K. Duraiswamy, "A Fragile Watermarking Scheme for Image Authentication with Tamper Localization Using Integer Wavelet Transform", Journal of Computer Science, Vol. 5, No. 11, pp. 831-837, 2009. DOI: https://doi.org/10.3844/jcssp.2009.831.837
DOI
|
6 |
A.Kannammal, S.Subha Rani, "Authentication of DICOM Medical Images using Multiple fragile watermarking Techniques in Wavelet Transform Domain", International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, pp. 181-189, 2011.
|
7 |
S. Dadkhah, A. Abd Manaf and S. Sadeghi, "Efficient Digital Image Authentication and Tamper Localization Technique Using 3Lsb Watermarking", International Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, pp. 1-8, 2012.
|
8 |
Heng Zhang, Chengyou Wang, and Xiao Zhou, "Fragile Watermarking Based on LBP for Blind Tamper Detection in Images", Journal of Information Processing Systems, Vol. 13, No. 2, pp. 385-399, 2017. DOI: https://doi.org/10.3745/JIPS.03.0070
DOI
|
9 |
H. S. Kim, Digital Watermarking, p. 546, Green Publishing, pp. 17-19, 2005.
|
10 |
P. Rahmati, A. Adler, T. Tran, " Watermarking in E-commerce", International Journal of Advanced Computer Science and Applications, Vol. 4, No. 6, pp. 256-265, 2013 DOI: https://doi.org/10.14569/ijacsa.2013.040634
DOI
|