[1]
|
Zhou Lin-Na. Study of Digital Forensics Based on Image Content [Ph.D. dissertation], Beijing University of Posts and Telecommunications, China, 2007 (周琳娜. 数字图像盲取证技术研究 [博士学位论文], 北京邮电大学, 中国, 2007)
|
[2]
|
Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 848-856
|
[3]
|
Peng F, Nie Y Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 2011, 212(1-3): e21-e25
|
[4]
|
Mahalakshmi S D, Vijayalakshmi K, Priyadharsini S. Digital image forgery detection and estimation by exploring basic image manipulations. Digital Investigation, 2012, 8(3-4): 215-225
|
[5]
|
Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1050-1065
|
[6]
|
Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimedia Tools and Applications, 2008, 39(1): 1-46
|
[7]
|
Qi Ke, Xie Dong-Qing. Watermarking scheme against geometrical attacks based on second generation Bandelet. Acta Automatica Sinica, 2012, 38(10): 1646-1653(綦科, 谢冬青. 基于第二代Bandelet变换的抗几何攻击图像水印. 自动化学报, 2012, 38(10): 1646-1653)
|
[8]
|
Aldeeb N H H, Abuhaiba I S I. An improved watermarking scheme for tiny tamper detection of color images. International Journal of Image, Graphics and Signal Processing, 2013, 5(5): 1-14
|
[9]
|
He H J, Chen F, Tai H M, Kalker T, Zhang J S. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196
|
[10]
|
Tzeng C H, Tsai W H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters, 2003, 7(9): 443-445
|
[11]
|
Yang H J, Alex C K. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters, 2006, 13(12): 741-744
|
[12]
|
Xi Y H, Zhang M R. A document watermarking algorithm based on partitioned character image. In: Proceedings of the 2009 International Conference on E-Business and Information System Security. Wuhan, China: IEEE, 2009. 1-4
|
[13]
|
Kwon O J, Kim W G, Kim Y. Binary image watermarking with tampering localization in binary wavelet transform domain. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(2): 341-346
|
[14]
|
Wu M, Liu B D. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia, 2004, 6(4): 528-538
|
[15]
|
Zhu Cong-Xu, Chen Zhi-Gang. Sensitive chaotic fragile watermarking technique for binary images verification. Mini-Micro Systems, 2006, 27(1): 151-154(朱从旭, 陈志刚. 一种灵敏的文本图像认证混沌脆弱水印技术. 小型微型计算机系统, 2006, 27(1): 151-154)
|
[16]
|
Li Zhao-Hong, Hou Jian-Jun, Song Wei. Binary document image authentication watermarking technique based on hierarchical structure. Acta Automatica Sinica, 2008, 8(8): 841-848(李赵红, 侯建军, 宋伟. 基于等级结构的二值文本图像认证水印算法. 自动化学报, 2008, 8(8): 841-848)
|
[17]
|
Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262-274
|
[18]
|
Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 2004, 13(4): 600-612
|
[19]
|
He Hong-Jie, Zhang Jia-Shu. Chaos-based scramble self-embedding watermarking algorithm. Journal on Communications, 2006, 27(7): 80-86, 93(和红杰, 张家树. 基于混沌置乱的分块自嵌入水印算法. 通信学报, 2006, 27(7): 80-86, 93)
|
[20]
|
He Hong-Jie. Digital Image Secure Authentication Watermarking Algorithms and Their Performance Analysis of Statistical Detection [Ph.D. dissertation]. Southwest Jiaotong University, China, 2009(和红杰. 数字图像安全认证水印算法及其统计检测性能分析 [博士学位论文], 西南交通大学, 中国, 2009)
|