1LU C S,LIAO H Y M. Multipurpose watermarking for image authentication and protection[J].IEEE Transactions on Image Processing,2001,(10).
2LUZ M,LIU C H. Semi-fragile image watermarking method based on index constrained vector quantization[J].IEEE Electron Device Letters,2003,(01).
3ZHANG JING,ZHANG CHUN-TIAN. Digital watermarking techniques for image authentication[J].Journal of Image and Graphics,2003,(04).doi:10.3969/j.issn.1006-8961.2003.04.002.
4EKICI O,SANKUR B,AKCAY M. Comparative assessment of semi-fragile watermarking methods[J].Journal of Electronic Imaging,2004,(01).
2[1]FLEET D J. Embedding invisible information in color images[A]. IEEE Int Conf on Image Processing[C]. 1997,1. 532-535.
3[2]COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997,6(12):1673-1687.
4[3]SWANSON M D, KOBAYASHI M, TEWFIK A H. Multiresolution data embedding and watermarking technologies[J]. Proceedings of the IEEE,1998,86(6):1064-1087.
5[4]BARNI M, BARTOLINI F, CAPPELLINI V, et al. A DCT-domain system for robust image watermarking[J]. Signal Processing, 1998,66(3):357-372.
6[5]KAEWKAMNERD N, RAO K R. Wavelet based image adaptive watermarking scheme[J]. Electronics Letters, 2000,36(2):312-313.
7Voyatzis G, Pitas I. Application of toral automorphisms in image watermarking[J]. IEEE Int. Conf. on Image Processing,1996,2:237-240.