Walton S.Information authentication for a slippery new age[J].Dr.Dobbs Journal,1995,20(4):18 ~26.
[2]
Memon N,Shende S,Wong P.On the security of the Yeung-Mintzer authentication watermark[A].In..Final Program and Proceedings of the IS&T PICS\' 99[C],Savanna,Georgia USA,1999:301 ~ 306.
[3]
Wong P W.A public key watermark for image verification and authentication[A].In:Proceedings of the IEEE International Conference on Image Processing[C],Chicago,Illinois,USA,1998,1:455 ~459.
[4]
Yeung M Mintzer F.Invisible watermarking for image verification[J].Journal of Electronic Imaging,1998,7(3):578 ~ 591.
[5]
Fridrich J,Goljan M,Memon N.Further attacks on Yeung-Mintzer fragile watermarking scheme[A].In:Proceedings of SPIE[C],San Jose,CA,USA,2000,3971:428 ~437.