Computer Science ›› 2020, Vol. 47 ›› Issue (10): 332-338.doi: 10.11896/jsjkx.191000060
• Information Security • Previous Articles
ZHENG Qiu-mei, LIU Nan, WANG Feng-hua
CLC Number:
[1]LIU X L,LIN C C,YUAN S M.Blind dual watermarking for color images’ authentication and copyright protection[J].IEEE Transactions on Circuits and Systems for Video Technology,2018,28(5):1047-1055. [2]TIWARI A,SHARMA M,TAMRAKAR R K.Watermarkingbased image authentication and tamper detection algorithm using vector quantization approach[J].International Journal of Electronics and Communications(AEU),2017(78):114-123. [3]ZHAN X,LI Y,LEI Y R,Chen C R.A grayscale images fragile watermark authentication system based on the singular value decomposition[J].Journal of Inner Mongolia University (Natural Science Edition),2015,44(3):385-388. [4]SHI J P,WU Y Q.Fragile watermarking for fingerprint images based on QR decomposition in NSCT-Domain[J].Journalof Applied Science-Electronics and Information Engineering,2017,35(6):735-744. [5]JING X Z,JIANG W Z.Fragile watermarking capable of locating tampered blocks in JPEG images[J].ACTA ELECTRONICA SINICA,2010,38(7):1585-1589. [6]ANSARI I A,PANT M,AHN C W.SVD based fragile watermarking scheme for tamper localization and self-recovery[J].International Journal of Machine Learning and Cybernetics,2016,7(6):1225-1239. [7]YEUNG M M,MINTZER F.An invisible watermarking tech-nique for image verification[C]//Proceedings of theICIP’97.Santa Barbara,California:IEEE,1997:680-683. [8]CHEN F,WANG H X.Secure fragile watermarking algorithm with tampered-pixels localization[J].Journal of the China Railway Society,2011,33(1):63-68. [9]MUNIR R.A chaos-based fragile watermarking method in spatial domain for image authentication[C]//2015 International Seminar on Intelligent Technology and Its Applications (ISITIA).IEEE,2015. [10]TONG X,LIU Y,ZHANG M,et al.A novel chaos-based fragile watermarking for image tampering detection and self-recovery[J].Signal Processing:Image Communication,2013,28(3):301-308. [11]KANG Q,KE L,HU C.An SVD-based fragile watermarkingscheme with grouped blocks[C]//2nd International Conference on Information Technology and Electronic Commerce (ICITEC).IEEE,2014. [12]SHAO L P,QIN Z,GAO H J,et al.2-Dimension non equilateral image scrambling transformation[J].Acta Electronica Sinica,2007,35(7):1290-1294. [13]LI Y K,FENG Q S,ZHOU F,et al.2-D Arnold transformation and non-equilateral image scrambling transformation[J].Computer Engineering and Design,2009,30(13):3133-3135. [14]ANSARI I A,PANT M.Multipurpose image watermarking in the domain of DWT based on SVD and ABC[J].Pattern Recognition Letters,2016,16(94):228-236. [15]SHEHAB A,ELHOSENY M,MUHAMMAD K,et al.Secureand robust fragile watermarking scheme for medical images[J].IEEE Access,2018,6:10269-10278. [16]ZHOU W,YU L,WANG Z,et al.Binocular visual characteristics based fragile watermarking scheme for tamper detection in stereoscopic images[J].International Journal of Electronics and Communications(AEU),2015,70(1):77-84. [17]SHI H,LI M C,GUO C,et al.A region-adaptive semi-fragiledual watermarking scheme[J].Multimedia Tools and Applications,2016,75(1):465-495. [18]TRIVEDY S,PAL A K.A Logistic map-based fragile water-marking scheme of digital images with tamper detection[J].Iranian Journal of Science and Technology,Transactions of Electrical Engineering,2017,41:103-113. [19]ZHANG H.Research on fragile watermarking schemes for image content authentication and self-recovery[D].Weihai:Shandong University,2018. [20]XIE G X.Self-recovery fragile watermarking algorithm for image content authentication[D].Chengdu:Southwest Jiaotong University,2017. |
[1] | TIAN Yang, BI Xiu-li, XIAO Bin, LI Wei-sheng, MA Jian-feng. Image Seam Carving Tampering Detection by Discrete Tchebichef Transform [J]. Computer Science, 2021, 48(6A): 43-50. |
[2] | SUI Li-li and WANG Chuan-jian. Checking Topological Integrity of Geographic Data Based on Fragile Watermarking [J]. Computer Science, 2016, 43(2): 183-187. |
[3] | CUI Wen-cheng, LIANG Shuang-shuang, SHAO Hong and WANG Hai-yu. Research on Detection of Image Region-duplication Forgery Affected by Intrinsically Identical Objects [J]. Computer Science, 2015, 42(Z6): 226-230. |
[4] | . Research and Design of Multimedia Digital Products Copyright Protection Model [J]. Computer Science, 2013, 40(1): 98-102. |
[5] | XIAO Lei. Image Spatial Semi-fragile Watermarking Algorithm with High Classification Capability of Attack Types [J]. Computer Science, 2010, 37(2): 286-289. |
[6] | . [J]. Computer Science, 2008, 35(1): 258-260. |
[7] | . [J]. Computer Science, 2007, 34(12): 252-256. |
|