• Optics and Precision Engineering
  • Vol. 10, Issue 3, 253 (2002)
, , and
Author Affiliations
  • [in Chinese]
  • show less
    DOI: Cite this Article
    [in Chinese], [in Chinese], [in Chinese]. Improved fragile watermark technique[J]. Optics and Precision Engineering, 2002, 10(3): 253 Copy Citation Text show less
    References

    [1] Petitcolas F A P, Anderson R J, Kuhn M G. Information Hiding[A].Proceedings of the IEEE[C] 1999, 87(7):1062-1078.

    [2] Kundur D, Hatzinakos. Digital Watermarking for Telltale Tamper Proofing and Authentication[A].Proceedings of the IEEE[C]. 1999,87(7):1167-1180.

    [3] Deepa K, Dimitrios H. Digital watermarking using multiresolution wavelet decomposition [A]. In International Conference on Acoustic, Speech and Signal Processing (ICASP)[C].Seattle, Washington, USA,IEEE,1998,5:2969-2972.

    [4] Hartung F, Kutter M. Multimedia Watermarking Techniques[A]. Proceedings of the IEEE[C]. 1999, (7): 1079-1107.

    [5] Hwang M S, Chang C C, Hwang K F. A Watermarking Technique based on One Way Hash Function[A]. IEEE Transaction on Consumer Electronics[C]. 1999,45(2):286-294.

    [6] Stollnitz E J, DeRose T D, Salesin D H. Wavelets for Computer Graphics: A Primer, Part 1[A]. IEEE Computer Graphics and Applications[C].1995, 15 (3): 76-84.

    [7] Hwang R W.A Robust Algorithm for Information Hiding in Digital Pictures[EB/OL].http://nif.www.media.edu/Data Hiding/index.html.1999.