|
[1]Li Chuanmu and Liu Lili, “An Image Authentication Scheme with Localization and Recovery,” Congress on Image and Signal Processing, Vol.5, pp.669-673, May, 2008. [2]Chien-Chang Chen and Husan-An Ke, “Authenticate an Image under DCT Domain with Attack Recovery,” 2008 Workshop of Image Processing, Computer Graphics, and Multimedia Technologies, Taipei, Nov., 2008. [3]S. Shefali and S.M.Deshpande, “Moment Invariants for Digital Image Authentication and Authorization,” International Conference on Control, Automation and Systems, pp.1296-1300, Oct. 2007. [4]Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, and Meng-Cheng Tsa,I, “A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation,” Fifth International Conference on Information Assurance and Security, Vol.2, pp. 615-618, Aug. 2009. [5]Amira Hassine, Rhouma Rhouma and Safya Belghith, “A novel method for tamper detection and recovery resistant to Vector Quantization attack,” 6th International Multi-Conference on Systems, Signals and Devices, pp.1-6, Mar. 2009. [6]Hao Luo, Shu-Chuan Chu, and Zhe-Ming Lu, “Self Embedding Watermarking Using Halftoning Technique,” Circuits, Systems, and Signal Processing, Vol. 27, pp.155-170, Apr. 2008. [7]F.H. Yeh and G. C.Lee, “Toral fragile watermarking for localizing and recovering tampered image,” Proceedings of 2005 International Symposium on Intelligent Signal Processing and Communication Systems, pp.321-324, Dec. 2005. [8]Yi Du and Ting Zhang, “A Reversible and Fragile Watermarking Algorithm Based on DCT,” International Conference on Artificial Intelligence and Computational Intelligence, Vol.1, pp.301-304, Nov. 2009. [9]Junquan Hu, Jiwu Huang, Daren Huang, and Yun Q. Shi, “A DWT-based fragile watermarking tolerant of JPEG compression,” IWDW'02 Proceedings of the 1st international conference on Digital watermarking, pp.179-188, 2003. [10]Ramesh Neelamani, Ricardo de Queiroz, Zhigang Fan, Sanjeeb Dash, and Richard G. Baraniuk, “JPEG compression history estimation for color images,” IEEE Transactions on Image Processing, Vol.15, pp.1365-1378, Jun. 2006. [11]SanthoshKumar Sunderrajan, “Exposing Digital Forgeries in JPEG and Bitmap Images,” University of California, Mar. 2009. [12]Weiqi Luo, Jiwu Huang, and Guoping Qiu “JPEG Error Analysis and Its Applications to Digital Image Forensics,” IEEE Transactions on Information Forensics and Security, pp.480-491, Jun. 2010. [13]Guobo Li, Songwen Pei, Gang Chen, Wenjun Cao, and Baifeng Wu, “A self-embedded watermarking scheme based on relationship function of corresponding inter-blocks DCT coefficient,” 13th International Conference on Computer Supported Cooperative Work in Design, pp.107-112, Apr. 2009. [14]Xiaojun Qi, Xing Xin, and Ran Chang, “Image authentication and tamper detection using two complementary watermarks,” 2009 16th IEEE International Conference on Image Processing (ICIP), pp.4257-4260, Nov. 2009. [15]Clara Cruz-Ramos, Rogelio Reyes-Reyes, Mariko Nakano-Miyatake, and Héctor Pérez-Meana, “Image Authentication Scheme Based on Self-embedding Watermarking,” Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Vol.5856, pp.1005-1012, 2009. [16]Li Bo, Tao Xu, Shengli Ji, Hao Jin, and Aiqin Zhang, “A New Semi-fragile Watermarking Algorithm for Image Authentication,” 7th World Congress on Intelligent Control and Automation, pp.5928-5932, Jun. 2008. [17]Clara Cruz, Jose Antonio Mendoza, Mariko Nakano Miyatake, Hector Perez Meana, and Brian Kurkoski, “Semi-Fragile Watermarking Based Image Authentication with Recovery Capability,”.International Conference on Information Engineering and Computer Science, pp.1-4, Dec.2009. [18]Chih-Hung Lin, Tung-Shih Su and Wen-Shyong Hsieh, “Semi-Fragile Watermarking Scheme for Authentication of JPEG Images,” Tamkang Journal of Science and Engineering, Vol.10, No. 1, pp.57-66, 2007. [19]Xiaoyun Wu, Jiwu Huang, Junquan Hu, and Yun-Qing Shi, “Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet,” Journal of Computers, Vol.17, No.2, pp.27-36, Jul. 2006. [20]Shinfeng D. Lin and Ai-Lin Chiang, “Tamper Detection and Recovery Using a Reversible Watermarking Technique,” Journal of Computers, Vol. 20, No. 1, pp.2-10, Apr. 2009. [21]Chiang-Lung Liu, “A JPEG-compliant method for image authentication and recovery,” Journal of Information Assurance and Security, Vol. 4, No. 6, pp.622-628, Nov. 2009. [22]Chiang-Lung Liu, “A Novel Image Authentication and Recovery Method for Applications of Image Sharing,” Eighth International Conference on Intelligent Systems Design and Applications, Vol.2, pp.127-132, Nov. 2008. [23]Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, and Bin-Yuan Huang, “A Recoverable Semi-Fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter,” Proceedings of the 5th international conference on Autonomic and Trusted Computing, Vol.5060, pp.629-640, 2008. [24]Syed Ali Khayam, “The Discrete Cosine Transform (DCT): Theory and Application,” Technical Report WAVES-TR-ECE802.602, Michigan State University, 2003. [25]Chin-Chen Chang, Ju-Yuan Hsiao, and Chi-Lung Chiang, “An Image Copyright Protection Scheme Based on Torus Automorphism,” First International Symposium on Cyber Worlds, pp.217-224, Nov. 2002. [26]Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 2001. [27]PENG Lei, “Adaptive Median Filtering,”http://www.massey.ac.nz/~mjjohnso/notes/59731 /presentations/Adaptive%20Median%20Filtering.doc, retrieved on Jul. 10, 2010. [28]Adobe Photoshop CS5, http://www.adobe.com/tw/products/photoshop/photoshop/, retrieved on Jul. 10, 2010.
|