[1] Wu Min, Liu Bede. Data hiding in binary image for authentication and annotation[J]. IEEE Trans on Multimedia, 2004, 6(4): 528-538. [2] 朱从旭, 陈志刚. 一种灵敏的文本图像认证混沌脆弱水印技术[J]. 小型微型计算机系统, 2006, 27(1): 151-154. Zhu Congxu, Chen Zhigang. Sensitive chaotic fragile watermarking technique for binary images verification[J]. Mini-Micro Systems, 2006, 27(1): 151-154. [3] 李赵红, 侯建军, 宋伟. 基于等级结构的二值文本图像认证水印算法[J]. 自动化学报, 2008, 34 (8): 841-848. Li Zhaohong, Hou Jianjun, Song Wei. Binary document image authentication watermarking technique based on hierarchical structure[J]. Acta Automatica Sinica, 2008, 34 (8): 841-848. [4] 张小华. 基于数字水印的图像认证技术研究. 西安: 西安电子科技大学, 2004: 48-54. [5] Kim H Y. A new public-key authentication watermarking for binary document images resistant to parity attacks// ICIP 2005. Genoa:, 2005: 1074-1077. [6] 伍宏涛, 朱柏承. 基于频谱特征的图像旋转角度盲检测算法[J]. 北京邮电大学学报, 2006, 29(3): 22-26. Wu Hongtao, Zhu Bocheng. Image rotation angle blind detecting algorithm based spectrum character[J]. Journal of Beijing University of Posts and Telecommunications, 2006, 29(3): 22-26. [7] Wong P W. A public key watermark for image verification and authentication// ICIP98. Chicago: , 1998: 455-459. [8] Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification[J]. IEEE Trans on Image Processing, 2001, 10(10): 1593-1601. [9] Zhang Yu, Zhang Jianhua, Liu Guangyi, et al. Impace of randomized cross-polarization discrimination on channel correlation property of the 3GPP spatial channel model[J]. IEICE Trans on Commun, 2009, E92-B(4): 1300-1307. |