[1] van SCHYNDEL R G, TIRKEL A Z, OSBOME C F. A digital watermark [C]//Proceedings of the IEEE International Conference on Image Processing. Washington, DC: IEEE Computer Society, 1994, 2: 86-90. [2] LAI C C, TSAI C C. Digital image watermarking using discrete wavelet transform and singular value decomposition [J]. IEEE Transactions on Instrumentation and Measurement, 2010,59(11):3060-3063. [3] KASHYAP N, SINHA G R. Image watermarking using 3-level Discrete Wavelet Transform (DWT)[J]. International Journal of Modern Education and Computer Science, 2012,4(3):50-56. [4] YADAV S, RAHUL G. Digital watermarking for color images using wavelet transform [EB/OL]. [2015-01-07]. http://piserjournal.org/wp-content/uploads/2014/05/V13-137-143.pdf. [5] TAO H, ZAIN J M, AHMED M M, et al. A wavelet-based particle swarm optimization algorithm for digital image watermarking [J]. Integrated Computer-Aided Engineering, 2012,19(1):81-91. [6] ZOPE-CHAUDHARI S, VENKATACHALAM P. Robust copyright protection of raster images using wavelet based digital watermarking [C]//Proceedings of the 2014 IEEE International Geoscience and Remote Sensing Symposium. Piscataway: IEEE, 2014:3129-3132. [7] PREDA R O. Self-recovery of unauthentic images using a new digital watermarking approach in the wavelet domain [C]//Proceedings of the 10th International Conference on Communications. Piscataway: IEEE, 2014:1-4. [8] MEERWALD P, UHL A. Watermark security via wavelet filter parametrization [C]//Proceedings of the IEEE International Conference on Image Processing. Washington, DC: IEEE Computer Society, 2001,3:1027-1030. [9] WU X, HU J, GU Z, et al. A secure semi-fragile watermarking for image authentication based on integer wavelet transform with parameters [C]//Proceedings of the 2005 Australian Information Security Workshop. Sydney: Australian Computer Society, 2005,44:75-80. [10] PIVA A, BARTOLINI F, CALDELLI R. Self recovery authentication of images in the DWT domain [J]. International Journal of Image and Graphics, 2005,5(1):149-165. [11] CHAMLAWI R, KHAN A, IDRIS A. Wavelet based image authentication and recovery [J]. Journal of Computer Science and Technology, 2007,22(6):795-804. [12] STOLAREK J. Adaptive wavelet synthesis for improving digital image watermarking [M]//Studies in Computational Intelligence. Berlin: Springer, 2012,401:133-143. [13] PALANIVEL M, SHANMUGAM A. Improved performance by parameterizing wavelet filters for digital image watermarking [J]. Signal and Image Processing, 2012,3(1):29-38. [14] TONG X, CUI M. A novel image encryption scheme based on feedback and 3D baker [C]//Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. Washington, DC: IEEE Computer Society, 2008:1-4. [15] LE H, LI T, SHI L. Improved image encryption algorithm based on Henon hyperchaotic system [J]. Journal of Computer Applications, 2011,31(7):1909-1916.(乐鸿辉,李涛,石磊.应用Henon超混沌系统改进的图像加密[J].计算机应用,2011,31(7):1909-1916.) [16] YANG L, SHAO L, GUO Y, et al. Image encryption algorithm based on maze permutation and Logistic chaotic map [J]. Journal of Computer Applications, 2014,34(7):1902-1908.(杨璐,邵利平,郭毅,等.基于迷宫置换和 Logistic 混沌映射的图像加密算法[J].计算机应用,2014,34(7):1902-1908.) [17] LIU H, STEINEBACH M. Semi-fragile watermarking for image authentication with high tampering localization capability [C]//Proceedings of the 2nd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution. Washington, DC: IEEE Computer Society, 2006:143-150. [18] ULLAH R, KHAN A, MALIK A S. Dual-purpose semi-fragile watermark: authentication and recovery of digital images [J]. Computers and Electrical Engineering, 2013,39(7):2019-2030. |