Huang F J, Huang J W, Shi Y Q. Detecting double JPEG compression with the same quantization matrix. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 848-856
[2]
Peng F, Nie Y Y, Long M. A complete passive blind image copy-move forensics scheme based on compound statistics features. Forensic Science International, 2011, 212(1-3): e21-e25
[3]
Mahalakshmi S D, Vijayalakshmi K, Priyadharsini S. Digital image forgery detection and estimation by exploring basic image manipulations. Digital Investigation, 2012, 8(3-4): 215-225
[4]
Stamm M C, Liu K J R. Anti-forensics of digital image compression. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 1050-1065
[5]
Haouzia A, Noumeir R. Methods for image authentication: a survey. Multimedia Tools and Applications, 2008, 39(1): 1-46
[6]
Qi Ke, Xie Dong-Qing. Watermarking scheme against geometrical attacks based on second generation Bandelet. Acta Automatica Sinica, 2012, 38(10): 1646-1653(綦科, 谢冬青. 基于第二代Bandelet变换的抗几何攻击图像水印. 自动化学报, 2012, 38(10): 1646-1653)
[7]
Aldeeb N H H, Abuhaiba I S I. An improved watermarking scheme for tiny tamper detection of color images. International Journal of Image, Graphics and Signal Processing, 2013, 5(5): 1-14
[8]
He H J, Chen F, Tai H M, Kalker T, Zhang J S. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196
[9]
Tzeng C H, Tsai W H. A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement. IEEE Communications Letters, 2003, 7(9): 443-445
[10]
Yang H J, Alex C K. Binary image authentication with tampering localization by embedding cryptographic signature and block identifier. IEEE Signal Processing Letters, 2006, 13(12): 741-744
[11]
Xi Y H, Zhang M R. A document watermarking algorithm based on partitioned character image. In: Proceedings of the 2009 International Conference on E-Business and Information System Security. Wuhan, China: IEEE, 2009. 1-4
[12]
Kwon O J, Kim W G, Kim Y. Binary image watermarking with tampering localization in binary wavelet transform domain. International Journal of Multimedia and Ubiquitous Engineering, 2012, 7(2): 341-346
[13]
Wu M, Liu B D. Data hiding in binary image for authentication and annotation. IEEE Transactions on Multimedia, 2004, 6(4): 528-538
Li Zhao-Hong, Hou Jian-Jun, Song Wei. Binary document image authentication watermarking technique based on hierarchical structure. Acta Automatica Sinica, 2008, 8(8): 841-848(李赵红, 侯建军, 宋伟. 基于等级结构的二值文本图像认证水印算法. 自动化学报, 2008, 8(8): 841-848)
[16]
Fridrich J, Goljan M, Memon N. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262-274
[17]
Wang Z, Bovik A C, Sheikh H R, Simoncelli E P. Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing, 2004, 13(4): 600-612
He Hong-Jie. Digital Image Secure Authentication Watermarking Algorithms and Their Performance Analysis of Statistical Detection [Ph.D. dissertation]. Southwest Jiaotong University, China, 2009(和红杰. 数字图像安全认证水印算法及其统计检测性能分析 [博士学位论文], 西南交通大学, 中国, 2009)
[20]
Zhou Lin-Na. Study of Digital Forensics Based on Image Content [Ph.D. dissertation], Beijing University of Posts and Telecommunications, China, 2007 (周琳娜. 数字图像盲取证技术研究 [博士学位论文], 北京邮电大学, 中国, 2007)