Optics and Precision Engineering, Volume. 10, Issue 3, 253(2002)
Improved fragile watermark technique
[1] [1] Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding[A].Proceedings of the IEEE[C] 1999, 87(7):1062-1078.
[2] [2] Kundur D, Hatzinakos. Digital Watermarking for Telltale Tamper Proofing and Authentication[A].Proceedings of the IEEE[C]. 1999,87(7):1167-1180.
[3] [3] Deepa K, Dimitrios H. Digital watermarking using multiresolution wavelet decomposition [A]. In International Conference on Acoustic, Speech and Signal Processing (ICASP)[C].Seattle, Washington, USA,IEEE,1998,5:2969-2972.
[4] [4] Hartung F, Kutter M. Multimedia Watermarking Techniques[A]. Proceedings of the IEEE[C]. 1999, (7): 1079-1107.
[5] [5] Hwang M S, Chang C C, Hwang K F. A Watermarking Technique based on One Way Hash Function[A]. IEEE Transaction on Consumer Electronics[C]. 1999,45(2):286-294.
[6] [6] Stollnitz E J, DeRose T D, Salesin D H. Wavelets for Computer Graphics: A Primer, Part 1[A]. IEEE Computer Graphics and Applications[C].1995, 15 (3): 76-84.
[7] [7] Hwang R W.A Robust Algorithm for Information Hiding in Digital Pictures[EB/OL].http://nif.www.media.edu/Data Hiding/index.html.1999.
Get Citation
Copy Citation Text
[in Chinese], [in Chinese], [in Chinese]. Improved fragile watermark technique[J]. Optics and Precision Engineering, 2002, 10(3): 253