Lu C S,Liao H Y M.Multipurpose watermarking for image authentication and protection[J].IEEE Transactions on Image Processing,2001,10(10):1579 ~ 1592.
[2]
Zhang Jing,Zhang Chunt-ian.Digital watermarking techniques for image authentication[J].Journal of Image and Graphics,2003,8(4):367~373.[张静,张春田.用于图像认证的数字水印技术[J].中国图象图形学报,2003,8(4):367~373.]
[3]
Fridrich J.Security of fragile authentication watermarks with localization[A].In:Proceedings of SPIE Photonic West,Electronic Imaging 2002,Security and Watermarking of Multimedia Contents[C],San Jose,California,2002,4675:691 ~ 700.
[4]
Cox I J,Miller M I.The first 50 years of electronic watermarking[J].Journal of Applied Signal Processing,2002,56 [(2):126 ~ 132.
[5]
Lu Z M,Liu C H.Semi-fragile image watermarking method based on index constrained vector quantisation[J].IEE Electronics Letters,2003,39(1):35~36.
[6]
Queluz M P.Spatial watermark for image content authentication[J].Jorunal of Electronic Imaging,2002,11 (2):275 ~ 285.
[7]
Ekici O,Sankur B,Akcay M.Comparative assessment of semifragile watermarking methods[J].Journal of Electronic Imaging,2004,13(1):209 ~216.
[8]
Qi Dong-xu.Fractal and computer application[M].Beijing:Science Press,1994.[齐东旭.分形及其计算机生成[M].北京:科学出版社,1994.]