[1]SCHLAUWEG M, PRFROCK D, PALFNER T, et al. Quantization-based semi-fragile public-key watermarking for secure image authentication [C]// Proceedings of SPIE 5915. [S.l.]: SPIE, 2005: 41-51.
[2]王颖,黄志蓓,译.数字水印[M].北京:电子工业出版社,2003.
[3]赵峰,李剑,李生红.基于沃尔什—哈达玛变换和卷积编码的半脆弱水印算法[J].通信学报,2009,30(10):89-95.
[4]段贵多,赵希,李建平,等.一种新颖的用于图像内容认证、定位和恢复的半脆弱数字水印算法研究[J].电子学报,2010,38(4):842-847.
[5]PRATT W K. Walsh functions in image processing and two dimensional filtering [C]// Proceedings of the Symposium on the Applications of Walsh Functions. Washington, DC: [s.n.], 1972:14-22.
[6]孙即祥.图像处理[M].北京:科学出版社,2009:143-144.
[7]LE PENNEC E, MALLAT S. Bandelet image approximation and compression [J].SIAM Journal of Multiscale Modeling and Simulation,2005,4(3):992-1039.
[8]PEYR G, MALLAT S. Surface compression with geometric Bandelets [J].ACM Transactions on Graphics: Proceedings of ACM SIGGRAPH 2005, 2005,24(3): 601-608.
[9]LE PENNEC E, MALLAT S. Sparse geometric image representation with Bandelets [J].IEEE Transactions on Image Processing,2005,14(4):423-438.
[10]PEYR G, MALLAT S. A Matlab tour of second generation Bandelets [EB/OL]. [2012-11-16]. http://www.cmap.polytechnique.fr/~peyre/bandelets/BandeletsTutorial.pdf.
[11]刘绪崇,罗永,王建新,等.基于第二代Bandelet变换的图像认证水印算法[J].通信学报,2010,31(12):123-130.
[12]李剑,李生红,孙锬锋.基于Logistic混沌序列和奇异值分解的半脆弱水印算法[J].上海交通大学学报, 2009, 43(7): 1144-1154. |