WONG P W, MEMON N. Secret and public key image watermarking schemes for image authentication andownership verification[J]. IEEE Trans on Image Processing, 2001, 10(10) : 1593-1601.
[2]
WU M, LIU B. Watermarking for image authentication[J]. Proc ICIP, 1998, 2(10) : 437-441.
[3]
LIN E T, DELP E J. A review of fragile image watermarks[Z]. Orlando: Proc of the Multimedia and Security Workshop ACM Multimedia'99) , 1999.
[4]
WALTON S. Information authentication for a slippery new age[J]. Dr Dobbs Journal, 1995, 20(4) : 18-26.
[5]
van SCHYNDEL R, TIRKEL A , OSBORCE C. A digital watermark[J]. Proc ICIP, 1994, 2(11) : 86-90.
[6]
WOLFGANG R B , DELP E J. Fragile watermarking using the VW2D watermark[Z]. Proc SPIE, Security andWatermarking of Multimedia Contents, San Jose, 1999.
[7]
YEUNG M, MINTZER F. Invisible watermarking for image verification[J]. Journal of Electronic Imaging, 1998,7(3) : 578-591.
[8]
WONG P W. A public key watermark for image verification and authentication[J]. Proc ICIP, 1998, 2(10) :455-459.
[9]
KUNDUR D, HATZINAKOS D. Towards a telltale watermarking technique for tamper-proofmg[J]. Proc ICIP,1998, 2(10) : 409-413.
[10]
XIE L, ARCE G. Joint wavelet compression and authentication watermarking[J]. Proc ICIP, 1998, 2(10) :427-431.
[11]
LIN Ching-yung. Watermarking and digital signature techniques for multimedia authentication and copyright protection[D]: [dissertation]. New York: Columbia University, 2000.
[12]
CALDERBANK R, DAUBECHIES I, SWELDENS W, et al. Wavelet transforms that map integers to integers[J]. Appl Comput Harmon Anal, 1998, 5(3) : 332-369.