[1] WOLFGANG R B, PODILCHUK C I, DELP E J. Perceptual watermarks for digital images and video[J]. Proceedings of the IEEE, 1999, 87(7): 1108-1126.
[2] VAN SCHYNDEL R G, TIRKEL A Z, OSBORNE C F. A digital watermark[C]. Proceedings of the 1st International Conference on Image Processing, IEEE, 1994(2): 86-90.
[3] COX I J, KILIAN J, LEIGHTON T, et al.. Secure spread spectrum watermarking for images, audio and video[C]. Proceedings of the 3rd IEEE International Conference on Image Processing, IEEE, 1996: 243-246.
[4] COX I J, KILIAN J, LEIGHTON F T, et al.. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
[5] RUANAIDH J J K O, DOWLING W J, BOLAND F M. Phase watermarking of digital images[C]. Proceedings of the 3rd IEEE International Conference on Image Processing, IEEE, 1999, 3: 239-242.
[6] KUNDUR D, HATZINAKOS D. A robust digital image watermarking method using wavelet-based fusion[C]. Proceedings of International Conference on Image Processing, IEEE, 1997: 544-547.
[7] ZHAO B, QIN G H. High robustness image watermarking algorithm[J]. Journal of Jilin University (Engineering and Technology Edition), 2017, 47(1): 249-254. (in Chinese)
[8] ZHENG Q M, JIN X, GU G M, et al.. A digital watermarking algorithm based on Data Matrix[J]. Journal of China University of Petroleum, 2015, 39(1): 188-193. (in Chinese)
[10] LOUKHAOUKHA K, NABTI M, ZEBBICHE K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization[J]. Opto-Electronics Review, 2014, 22(1): 45-54.
[11] QI X J, XIN X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization[J]. Journal of Visual Communication and Image Representation, 2015, 30: 312-327.
[12] SUTHAHARAN S. Fragile image watermarking using a gradient image for improved localization and security[J]. Pattern Recognition Letters, 2004, 25(16): 1893-1903.
[13] HE H J, ZHANG J SH, TAI H M. A secure fragile watermarking scheme for image authentication[C].Proceedings of 2006 International Conference on Computational Intelligence and Security, IEEE, 2006: 1180-1185.
[14] KUNDUR D, HATZINAKOS D. Digital watermarking for telltale tamper proofing and authentication[J]. Proceedings of the IEEE, 1999, 87(7): 1167-1180.
[15] FRIDRICH J, GOLJAN M. Images with self-correcting capabilities[C]. Proceedings of 1999 International Conference on Image Processing, IEEE, 1999: 792-796.
[16] LIN P L, HUANG P W, PENG A W. A fragile watermarking scheme for image authentication with localization and recovery[C]. Proceedings of the 6th International Symposium on Multimedia Software Engineering, IEEE, 2004: 146-153.
[17] WANG D CH, TIAN C C, CHEN B J, et al.. Dual watermarking for color images based on 4D quaternion frequency domain[J]. Journal of Jilin University (Engineering and Technology Edition), 2015, 45(4): 1336-1346. (in Chinese)
[18] BENNETT C H, BRASSARD G. Quantum cryptography: public key distribution and coin tossing[C]. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE, 1984.
[19] WANG Y H, ZHU CH Q, SU SH B, et al.. An authentication method based on perceptual hashing and watermarking for remote sensing image[J]. Opt. Precision Eng., 2016, 24(10): 640-648. (in Chinese)
[20] SINGH A K, DAVE M, MOHAN A. Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain[J]. National Academy Science Letters, 2014, 37(4): 351-358.