共 33 条
- [1] Ghosal SK, Mandal JK., Binomial transform based fragile watermarking for image authentication, Journal of Information Security and Applications, 19, 4–5, pp. 272-281, (2014)
- [2] Vyas C, Lunagaria M., A review on methods for image authentication and visual cryptography in digital image watermarking, Proc. of the 2014 IEEE Int’l Conf. on Computational Intelligence and Computing Research, pp. 1-6, (2014)
- [3] Chang CC, Chen KN, Lee CF, Liu LJ., A secure fragile watermarking scheme based on chaos-and-hamming code, Journal of Systems and Software, 84, 9, pp. 1462-1470, (2011)
- [4] Huo YR, He HJ, Chen F., Alterable-capacity fragile watermarking scheme with restoration capability, Optics Communications, 285, 7, pp. 1759-1766, (2012)
- [5] Qin C, Ji P, Zhang XP, Dong J, Wang JW., Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy, Signal Processing, 138, pp. 280-293, (2017)
- [6] Su GD, Chang CC, Chen CC., A hybrid-Sudoku based fragile watermarking scheme for image tampering detection, Multimedia Tools and Applications, 80, 8, pp. 12881-12903, (2021)
- [7] Kim C, Yang CN., Self-embedding fragile watermarking scheme to detect image tampering using AMBTC and OPAP approaches, Applied Sciences, 11, 3, (2021)
- [8] Zhang XP, Yin ZX., Data hiding in multimedia, Chinese Journal of Nature, 39, 2, pp. 87-95, (2017)
- [9] Li XL., A review on image reversible data hiding, Journal of Information Security Research, 2, 8, pp. 729-734, (2016)
- [10] Tian J., Reversible data embedding using a difference expansion, IEEE Trans. on Circuits and Systems for Video Technology, 13, 8, pp. 890-896, (2003)