Zeng G R,Qiu Z D.Evaluation model for robustness of digital watermarking[J]. Acta Phys.Sin.,2010,59(8):5871-5880.[曾高荣,裘正定.数字水印的鲁棒性评测模型[J]. 物理学报,2010,59(8):5871-5880.]
[2]
Zhao C H,Liu W.Block compressive sensing based image semi-fragile zero-watermarking algorithm[J]. Acta Automatica Sinica,2012,38(4):609-617.[赵春晖,刘巍.基于分块压缩感知的图像半脆弱零水印算法[J]. 自动化学报,2012,38(4):609-617.]
[3]
Wen Q, Sun T F,Wang S X. Concept and application of zero-watermark[J]. Acta Electronic Sinica,2003,31(2):214-216.[温泉,孙锬锋,王树勋.零水印的概念与应用[J].电子学报,2003,31(2):214-216.]
[4]
Jin J. Multiple zero-watermarks algorithm based on cellular automata[J]. Journal of Optoelectronics?Laser,2009,20(3):382-387.[金军. 基于元胞自动机的多重零水印算法[J]. 光电子?激光,2009,20(3):382-387.]
[5]
Zhao C H,Liu W. Mutual support dual watermark algorithm based on compressive sensing[J]. Acta Electronica Sinica,2012,40(4):681-687.[赵春晖,刘巍. 基于压缩感知的交互支持双水印算法[J]. 电子学报,2012,40(4):681-687.]
[6]
Han S C,Zhang Z N,Zhang Y J. Robust zero-watermark algorithm based on non-subsampled sheaa-let ransform and QR decomposition[J]. Journal of Optoelectronics?Laser,2012,23(10):1957-1964.[韩绍程,张兆宁,张玉金. 基于非下采样剪切波变换和QR分解的鲁棒零水印算法[J]. 光电子?激光,2012,23(10):1957-1964.]
[7]
Zhang L B,Ma X Y,Chen Q.Image zero-watermarking algorithm based on region of interest[J]. Journal on Communications,2009,30(11A):117-120.[张立保,马新悦,陈琪. 基于感兴趣区的图像零水印算法[J].通信学报,2009,30(11A):117-120.]
[8]
Liu F,Wu C K. Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners[J]. Information Security,IET,2011,5(2):121-128. DOI:10.1049/iet-ifs.2009.0183
[9]
Abusitta A H. A visual cryptography based digital image copyright protection[J]. Journal of Information Security,2012,3:96-104.
[10]
Bharathi M,Charanya R,Vijayan T. Halftone visual cryptography & watermarking[J]. International Journal of Engineering Research & Technology,2013,4(2):2747-2752.
[11]
Rawat S, Raman B. A blind watermarking algorithm based on fractional Fourier transform and visual cryptography[J].Signal Processing, 2012,9(6):1480-1491.
[12]
Verma J, Khemchandani V.A visual cryptographic technique to secure image shares[J]. Internationa Journal of Engineering Research and Applications, 2012,2(1):1121-1125.
[13]
Tu S H, Hsu C S. A joint ownership protection scheme for digital images based on visual cryptography[J]. The International Arab Journal of Information Technology,2012,9(3):276-283.
[14]
Naor M,Shamir A.Visual cryptography[C]//Advances in Cryptology-Eurocrypt\'94. Berlin: LNCS 1995, 950:1-12.
[15]
Wu H L,Zhou J L,Gong X G, et al. A novel blind watermarking algorithm joint JPEG image encoding and cellular automata[J]. Journal of Electronics & Information Technology,2012,34(4):344-350[DOI:10.3724/SP.J.1146.2011.00667][吴慧琳,周激流,龚小刚,等.一种与JPEG图像压缩编码结合的细胞自动机域盲水印算法[J]. 电子与信息学报,2012,34(4):344-350.]