[1] LU C S, LIAO H Y M. Multipurpose watermarking for image authentication and protection [J]. IEEE Transactions on Image Processing, 2001, 10(10): 1579-1592.[2] FRIDRICH J. Security of fragile authentication watermarks with localization [C]// Proceedings of SPIE Photonic West Electronic Imaging 2002, Security and Watermarking of Multimedia Contents. San Jose, California: [s.n.], 2002: 691-700.[3] WU ZHIJUN. LPC parameters substitution for speech information hiding [J]. Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 103-112.[4] HAROUTUNIAN M E, TONOYAN S A. Random coding bound of information hiding E-capacity [C]// Proceedings of 2008 IEEE International Symposium on Information Theory. Piscataway, NJ: IEEE Press, 2008: 536.[5] 张静,张春田.用于图象认证的数字水印技术[J].中国图象图形学报,2003,8(4):367-373.[6] GUO J Y, LU C S, LIAO H Y M. Mean quantization based fragile watermarking for image authentication [J]. Optical Engineering, 2001, 40(7): 1396-1408.[7] EKICI , SANKUR B, AKCAY M. Comparative assessment of semi fragile watermarking methods [J]. Journal of Electronic Imaging, 2004, 13(1): 209-216.[8] 王向阳,杨红颖,陈利科,等.基于视觉掩蔽特性的半脆弱水印技术研究[J].中国图象图形学报,2005,10(12):1548-1553.[9] CHE SHENGBING, CHE ZUGUO, MA BIN, et al. Semi-fragile image watermarking algorithm based on image character [C]// CSSE'08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering. Washington, DC: IEEE Computer Society, 2008: 733-737.[10] CHEN YU, QU FANG, HU JIANBIN, et al. Density adjustable pseudorandom sequence and its applications in information hiding [C]// MINES 2009: Proceedings of the 1st International Conference on Multimedia Information Networking and Security. Washington, DC: IEEE Computer Society, 2009: 91-94. |