[1]MARTINO F D, SESSA S. Fragile watermarking tamper detection with images compressed by fuzzy transform[J]. Information Sciences, 2012, 195(1): 62-90.[2]DENG X H, CHEN Z G, DENG X H, et al. A novel dual-layer reversible watermarking for medical image authentication and EPR hiding[J]. Advanced Science Letters, 2011, 4(11): 3678-3684.[3]CHIANG K H, CHIEN K C C, CHANG R F, et al. Tamper detection and restoring system for medical images using wavelet-based reversible data embedding[J]. Journal of Digital Imaging, 2008, 21(1): 77-90.[4]GUO X T, ZHUANG T G. Lossless watermarking for verifying the integrity of medical images with tamper localization[J]. Journal of Digital Imaging, 2009, 22(6): 620-628.[5]PHADIKAR A, MAITY S P, MANDAL M. Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images[J]. Journal of Visual Communication and Image Representation, 2012, 23(3): 454-466.[6]LI C L, WANG Y H, MA B, et al. Tamper detection and self-recovery of biometric images using salient region-based authentication watermarking scheme[J]. Computer Standards and Interfaces, 2012, 34(4): 367-379. [7]黄斌, 史亮, 邓小鸿, 等. 自适应高容量医学图像可逆数据隐藏算法[J]. 计算机应用, 2012, 32(10): 2779-2782.[8]ZHU Z L, ZHANG W, WONG K W, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011, 181(6): 1171-1186.[9]WANG Y, WONG K W, LIAO X F, et al. A new chaos-based fast image encryption algorithm[J]. Applied Soft Computing, 2011, 11(1): 514-522.[10]朱从旭,黄大足,郭迎. 结合多混沌映射和输出反馈的图像加密算法[J]. 武汉大学学报:信息科学版, 2010,35(5):528-531.[11]任丽梅, 刘建民, 贾双盈. 一个新混沌系统的自适应模糊同步[J]. 计算机工程与科学, 2012, 34(7):146-149.[12]RAWAT S, RAMAN B. A chaotic system based fragile watermarking scheme for image tamper detection[J]. International Journal of Electronics and Communications, 2011, 65(10): 840-847. |