[1] ZHANG D X,PAN Z G,LI H H. A Contour-Based Semi-Fragile Image Watermarking Algorithm in DWT Domain [C]//
March 6-7,2010. Washington D C,US:IEEE Computer Society,2010:228-231.
Proceedings of 2010 Second International Workshop on Education Technology and Computer Science,Wuhan,China,
[3] 2009 International Conference on Management of e-Commerce and e-Government,Nanchang,China,September 16-19,2009. Washington D C,US:IEEE Computer Society,2009:498-502.
WANG X Q,WANG J,PENG H. A Semi-Fragile Image Watermarking Resisting to JPEG Compression [C]// Proceedings of
[4] [J]. Electronics Letters(S0013-5194),2003,39(1):35-36.
LU Z M,LIN C H,XU D G,et al. Semi-Fragile Image Watermarking Method Based on Index Constrained Vector Quantization
[5] Chamlawi R,Khan A,Idris A,et al. A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images
Based on Wavelet Transform [J]. World Academy of Science, Engineering and Technology(S1307-6892),2006,23(11):
49-53.
[6] Ishihara N,Abe K. A Semi-Fragile Watermarking Scheme Using Weighted Vote With Sieve And Emphasis For Image Authentication [J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences(S0916-8508),2007,E90-A(5):1045-1054.
[7] Computer Science(S0127-9084),2009,22(1):64-84.
Seng W C,Du J,Pham B. Semi Fragile Watermark with Self Authentication and Self Recovery [J]. Malaysian Journal of
[8] Thailand,July 16-19,2002:623-626.
Ko H H,Park S J. Semi-Fragile Watermarking for Telltale Tamper Proofing and Authenticating [C]//Proceedings of the 17th International Technical Conference on Circuits/Systems Computers and Communications (ITC-CSCC 2002),Phuket,
[9] WANG Xiang-yang,CHEN Li-ke. A Novel Adaptive Semi-fragile Watermarking Scheme Based on Image Content [J]. ACTA Automatica Sinica,2007,33(4):361-366.
[10] Science and Engineering(S1560-6686),2007,10(1):57-66.
Lin C H,Su T S,Hsieh W S. Semi-fragile Watermarking Scheme for Authentication of JPEG Images [J]. Tamkang Journal of
[11] Kao C W,Chang L W. Zernike Moments and Edge Features Based Semi-Fragile Watermark for Image Authentication with Tampering Localization [C]//Proceedings of 2009 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference,Sapporo,Japan,October 4-7,2009:555-562.
[12] QI H Y,Zheng D,Zhao J Y. Human Visual System Based Adaptive Digital Image Watermarking [J]. Signal Processing(S0165-1684),2008,88(1):174-188.
[13] Barni M,Bartolini F,Piva A. Improved Wavelet-Based Watermarking through Pixel-Wise Masking [J]. IEEE Transactions on
Image Process(S1057-7149),2001,10(5):783-791.
[14] SHEN Lan-sun,ZHANG jing,LI Xiao-guang. Image Retrieval and Compressed Domain Processing [M]. Beijing:Posts and Telecom Press,2008:12-13.
[15] Sidiropoulos P,Nikolaidis N,Pitas I. Invertible Chaotic Fragile Watermarking for Robust Image Authentication [J]. Chaos,Solitons & Fractals(S0960-0779),2009,42(5):2667-2674.
[16] Bartollini F,Tefas A,Barni M,et al. Image Authentication Techniques for Surveillance Applications [J]. Proceedings of the IEEE(S0018-9219),2001,89(10):1403-1418.