[1]
|
Cox I J,Miller M L,Bloom J A. Digital Watermarking. San Francisco:Morgan Kaufmann,2001[2] Wang Xiang-Yang,Hou Li-Min,Wu Jun. Feature-based digital image watermarking scheme robust to geometric attacks. Acta Automatica Sinica,2008,34(1):1-6(王向阳,侯丽敏,邬俊. 基于图像特征点的强鲁棒数字水印嵌入方案. 自动化学报,2008,34(1):1-6)[3] Xu Zi-Han,Wang Xiang-Yang. An SVR based image watermarking detection algorithm against geometric attacks. Acta Automatica Sinica,2009,35(1):23-27(徐紫涵,王向阳. 可有效抵抗一般性几何攻击的数字水印检测方法. 自动化学报,2009,35(1):23-27)[4] Deng Cheng,Li Jie,Gao Xin-Bo. Geometric attacks resistant image watermarking in affine covariant regions. Acta Automatica Sinica,2010,36(2):221-228(邓成,李洁,高新波. 基于仿射协变区域的抗几何攻击图像水印算法. 自动化学报,2010,36(2):221-228)[5] Barton J M. Method and Apparatus for Embedding Authentication Information within Digital Data. U.S. Patent 5646997,July 1997[6] Fridrich J,Goljan M,Du R. Invertible authentication. In:Proceedings of the SPIE Security and Watermarking of Multimedia Contents. San Jose,USA:SPIE,2001. 197-208[7] Celik M U,Sharma G,Tekalp A M,Saber E. Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing,2005,14(2):253-266[8] Tian J. Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896[9] Alattar A M. Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing,2004,13(8):1147-1156[10] Thodi D M,Rodriquez J J. Prediction-error-based reversible watermarking. In:Proceedings of the International Conference on Image Processing. Singapore,Singapore:IEEE,2004. 1549-1552[11] Thodi D M,Rodriguez J J. Expansion embedding techniques for reversible watermarking. IEEE Transactions on Image Processing,2007,16(3):721-730[12] Weng S W,Zhao Y,Pan J S,Ni R R. Reversible watermarking based on invariability and adjustment on pixel pairs. IEEE Signal Processing Letters,2008,15:721-724[13] Weng S W,Zhao Y,Ni R R,Pan J S. Parity-invariability-based reversible watermarking. Electronics Letters,2009,45(20):1022-1023[14] Ni Z C,Shi Y Q,Ansari N,Su W. Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362[15] Xuan G,Yao Q,Yang C,Gao J,Chai P,Shi Y Q,Ni Z C. Lossless data hiding using histogram shifting method based on integer wavelets. In:Proceedings of the International Workshop on Digital Watermarking. Jeju Island,Korea:Springer,2006. 323-332[16] Wu X Y. Reversible semi-fragile watermarking based on histogram shifting of integer wavelet coefficients. In:Proceedings of the Digital Ecosystems and Technologies Conference. Cairns,Australia:IEEE,2007. 501-505[17] Lin C C,Tai W L,Chang C C. Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition,2008,41(12):3582-3591[18] Tsai P,Hu Y C,Yeh H L. Reversible image hiding scheme using predictive coding and histogram shifting. Signal Processing,2009,89(6):1129-1143[19] Tai W L,Yeh C M,Chang C C. Reversible data hiding based on histogram modification of pixel differences. IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910[20] Hwang J,Kim J,Choi J. A reversible watermarking based on histogram shifting. In:Proceedings of the International Workshop on Digital Watermarking. Jeju Island,Korea:Springer,2006. 348-361[21] Yang B,Schmucker M,Busch C,Niu X,Sun S. Approaching optimal value expansion for reversible watermarking. In:Proceedings of the 7th Workshops on Multimedia and Security. New York,USA:ACM,2005. 95-102[22] Wang J X,Ni J Q. A fast performance estimation scheme for histogram shifting based multi-layer embedding. In:Proceedings of the 17th IEEE International Conference on Image Proessing. Hong Kong,China:IEEE,2010. 3701-3704[23] Luo L,Chen Z,Chen M,Zeng X,Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security,2010,5(1):187-193
|