[1] 高海英, 钮心忻, 杨义先. 基于量化的小波域自同步数字音频水印算法. 北京邮电大学学报, 2005, 28(6): 102-105. Gao Haiying, Niu Xinxin, Yang Yixian. Synchronic digital audio watermarking algorithm based on quantizing wavelet domain parameters[J]. Journal of Beijing University of Posts and Telecommunications, 2005, 28(6): 102-105. [2] Wong P W. A public key watermark for image verification and authentication//Proceedings ICIP. Chicago: , 1998: 455-459. [3] Matth Holliman, Nasir Memon. Counterfeiting attacks oblivious block-wise independent invisible watermarking schemes[J]. IEEE Trans, 2000, IP-19(3): 432-441. [4] Ping Wah Wong, Memon N. Secret and public keyimage watermarking schemes for image authentication and ownership verification[J]. Image Processing, IEEE Transactions on, 2001, 10(10): 1593-1601. [5] Coppersmith D, Mintzer F, Tresser C. Fragile imperceptible digital watermark with privacy control//Proceedings of SPIE/IS&T Int Symp Electronic Imaging: Science and Technology. San Jose: , 1999: 659-670. [6] Liu Feilong, Zhu Xinshan, Wang Yangsheng. Feature based fragile image watermarking framework[J]. ACTA Automatica Sinica, 2004, 30(5): 641-651. [7] Celik M, Sharma G, Saber E, et al. Hierarchical watermarking for secure image authentication with localization[J]. IEEE Transactions on Image Processing, 2002, 11(6): 585-595. [8] Hae Yong Kim. A new public-key authentication watermarking for binary document images resistant to parity attacks[J]. Image Processing, IEEE International Conference on, 2005(2): 1074-1077. [9] Li Zhaohong, Hou Jianjun. A chaos-based model for fragile watermarking: model development and simulation results[J]. Signal Processing, ICSP 2006, IEEE International Conference on, 2006(9): 2627-2631. [10] 陈明奇, 钮心忻, 杨义先. 数字水印的研究进展和应用[J]. 通信学报, 2001, 22(5): 71-79. |