[2]Lin C Y, Chang S F. Issues and solutions for authenticating MPEG video[A]. In:Proc. of SPIE[C], San Jose, CA, USA,1999,3657:54~65.
[2]
[4]Queluz M P. Authentication of digital images and video: Generic models and a new contribution [J]. Signal Processing: Image Communication, 2001,16(5) :461~475.
[3]
[6]Wu M, Liu B. Attacks on digital watermarks[A]. In: Proc. of the IEEE Record of the Asilomar Conference on Signals,Systems and Computers [C], IEEE, USA. 1999, 2:1508 ~1512.
[4]
[8]Walton S. Information authentication for a slippery new age[J].Dr. Dobbs Journal, 1995,20(4): 18~26.
[5]
[11]Fridrich J, Goljan M. Images with self-correcting capabilities[A]. In: Proceedings of the IEEE International Conference on Image Processing[C]. Kobe, Japan, Oct. 1999,3:792~796.
[6]
[14]Noguchi Y, Kobayashi H, Kiya H. A method of extracting embedded binary data from JPEG bitstreams using standard JPEG decoder [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, 2000, E83-A (8) :1582~1588.
[7]
[16]Fridrich J. Methods for detecting changes in digital images[A].In:Proc. of the 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems[C], Melbourne,Australia, Nov. 1998, 173~177.
[8]
[18]Lin E T, Podilchuk C I, Delp E J. Detection of image alterations using semi-fragile watermarks [A]. In:Proc. of SPIE Security and Watermarking of Multimedia Contents Ⅱ[C], San Jose,CA,USA,Jan. 2000, 3971: 152~163.
[9]
更多...
[10]
[21]Zhu B, Swanson M D, Tewfik A H. Transparent robust authentication and distortion measurement technique for images[A]. In:Proc. of IEEE Digital Signal Processing Workshop[C],Loen, Norway, Sep. 1996, 45~48.
[11]
[23]Xie L, Arce G. Joint wavelet compression and authentication watermarking[A]. In: Proceedings of the IEEE International Conference on Image Processing [C]. Chicago, Illinois, Oct.1998, 2: 427~431.
[12]
[25]Kundur D, Hatzinakos D. Towards a telltale watermarking technique for tamper-proofing[A]. In: Proceedings of the IEEE International Conference on Image Processing [C]. Chicago,Illinois, Oct. 1998, 2: 409~413.
[13]
[1]Dittmann J, Steinmetz A, Steinmetz R. Content-based digital signature for motion pictures authentication and content-fragile watermarking [A]. In: Proc. of the 6th IEEE International Conference on Multimedia Computing and Systems [C],Florence, Italy, 1999,2:209~213.
[14]
[3]Lin E T, Delp E J. A review of fragile image watermarks[A].In: Proc. of the Multimedia and Security Workshop (ACM Multimedia\'99) Multimedia Contents[C], Orlando, FL, USA,1999:25~29.
[15]
[5]Memon N, Shende S, Wong P. On the security of the YeungMintzer authentication watermark [A]. In: Final Program and Proceedings of the IS&T PICS 99[C], Savanna, Georgia, 1999:301~306.
[16]
[7]Fridrich J, Goljan M, Memon N. Further attacks on YeungMintzer frigile watermarking scheme [A]. In: Proceedings of SPIE[C], San Jose, CA, USA, Jan. 2000,3971:428~437.
[17]
[9]Yeung M, Mintzer F. Invisible watermarking for image verification[J]. Journal of Electronic Imaging. 1998, 7(3): 578~591.
[18]
[10]Wong P W. A public key watermark for image verification and authentication[A]. In: Proceedings of the IEEE International Conference on Image Processing[C]. Chicago, Illinois, USA,Oct. 1998,1: 455~459.
[19]
[12]Lee J, Won C S. A watermarking sequence using parities of error control coding for image authentication and correction[J].IEEE Transactions on Consumer Electronics, 2000,46 (2) :313 ~317.
[20]
[13]Wu M, Liu B. Watermarking for image authentication[A]. In:Proceedings of the IEEE International Conference on Image Processing[C]. Chicago, Illinois, Oct. 1998, 2: 437~441.
[21]
[15]Lin C Y, Chang S F. Semi-fragile watermarking for authentication JPEG visual content [A]. In: Proc. of SPIE Security and Watermarking of Multimedia Contents Ⅱ[C], San Jose, CA, USA, Jan. 2000, 3971: 140~151.
[22]
[17]Fridrich J. Visual hash for oblivious watermarking [A]. In:Proceedings of SPIE [C], San Jose, CA, USA, Jan. 2000,3971: 286~294.
[23]
[19]Tefas A, Pitas I. Image authentication using chaotic mixing systems [A]. In: Proceedings of the IEEE International Symposium on Circuits and System[C], Geneva, Switzerland,May 2000, 1: 216~219.
[24]
[20]Rey C, Dujelay J L. Blind detection of malicious alterations on still images using robust watermarks [A]. In:IEE Secure Image Authentication colloquium[C], London, UK, Apr. 2000.
[25]
[22]Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing, 2001,10 (10) : 1579~1592.
[26]
[24]Said A, Pearlman W A. A new fast and efficient image codec based on set partitioning in hierarchical trees [J]. IEEE Trans.on Circuits and Systems for Video Technology, 1996, 6 (3):243~250.
[27]
[26]Yu G J, Lu C S, Liao H Y M et al. Mean quantization blind watermarking for image authentication[A]. In: Proc. of the IEEE International Conference on Image Processing [C],Vancouver, BC, Canada, 2000, 3: 706~709.