Optics and Precision Engineering, Volume. 10, Issue 3, 253(2002)

Improved fragile watermark technique

[in Chinese]... [in Chinese] and [in Chinese] |Show fewer author(s)
Author Affiliations
  • [in Chinese]
  • show less
    References(7)

    [1] [1] Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding[A].Proceedings of the IEEE[C] 1999, 87(7):1062-1078.

    [2] [2] Kundur D, Hatzinakos. Digital Watermarking for Telltale Tamper Proofing and Authentication[A].Proceedings of the IEEE[C]. 1999,87(7):1167-1180.

    [3] [3] Deepa K, Dimitrios H. Digital watermarking using multiresolution wavelet decomposition [A]. In International Conference on Acoustic, Speech and Signal Processing (ICASP)[C].Seattle, Washington, USA,IEEE,1998,5:2969-2972.

    [4] [4] Hartung F, Kutter M. Multimedia Watermarking Techniques[A]. Proceedings of the IEEE[C]. 1999, (7): 1079-1107.

    [5] [5] Hwang M S, Chang C C, Hwang K F. A Watermarking Technique based on One Way Hash Function[A]. IEEE Transaction on Consumer Electronics[C]. 1999,45(2):286-294.

    [6] [6] Stollnitz E J, DeRose T D, Salesin D H. Wavelets for Computer Graphics: A Primer, Part 1[A]. IEEE Computer Graphics and Applications[C].1995, 15 (3): 76-84.

    [7] [7] Hwang R W.A Robust Algorithm for Information Hiding in Digital Pictures[EB/OL].http://nif.www.media.edu/Data Hiding/index.html.1999.

    Tools

    Get Citation

    Copy Citation Text

    [in Chinese], [in Chinese], [in Chinese]. Improved fragile watermark technique[J]. Optics and Precision Engineering, 2002, 10(3): 253

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Oct. 24, 2001

    Accepted: --

    Published Online: Sep. 18, 2007

    The Author Email:

    DOI:

    Topics