Author:
Li Chunlei,Ma Bin,Wang Yunhong,Huang Di,Zhang Zhaoxiang
Publisher
Springer Berlin Heidelberg
Reference9 articles.
1. Li, C.T., Si, H.: Wavelet-based fragile watermarking scheme for image authentication. Journal of Electronic Imaging 16(1), 013009 (2007)
2. Tsai, M.-J., Chih-Chien: Authentication and recovery for wavelet-based semifragile watermarking. Optical Engineering 47(6), 067005, 1–9 (2008)
3. Chamlawi, R., Khan, A., Usman, I.: Authentication and recovery of images using multiple watermarks. Computers and Electrical Engineering 36, 578–584 (2010)
4. Chamlawi, R., Khan, A.: Digital image authentication and recovery: Employing integer transform based information embedding and extraction. Information Sciences 180, 4909–4928 (2010)
5. Holliman, M., Memon, N.: Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes. IEEE Transactions on Image Processing 3(10), 432–441 (2000)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献