[1] LIN C. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2):153——168. [2] YANG S, XU C, ZHANG S. Combinational image watermarking in the spatial and frequency domains[J]. Pattern Recognition, 2003, 36(4):969-975. [3] KIM Y W, OH I S. Watermarking text document images using edge direction histograms[J]. Pattern Recognition Letters, 2004, 25(11):1243-1251. [4] CHAN C, CHANG C. An efficient image authentication method based on Hamming code[J]. Pattern Recognition, 2007, 40(2):681-690. [5] LU H, SHEN R, CHUNG F L. Fragile watermarking scheme for image authentication[J]. Electronics Letters, 2003, 39(12):898-900. [6] LEE T, LIN S. Dual watermark for image tamper detection and recovery[J]. Pattern Recognition, 2008, 41(11):3497-3506. [7] YUAN H, ZHANG X. Multiscale fragile watermarking based on the Gaussian mixture model[J]. IEEE Transactions on Image Processing, 2006, 15(10):3189-3200. [8] CHUANG J, HU Y. An adaptive image authentication scheme for vector quantization compressed image[J]. Journal of Visual Communication and Image Representation, 2011, 22(5):440-449. [9] CHAN C. An image authentication method by applying Hamming code on rearranged bits[J]. Pattern Recognition Letters, 2011, 40(2):1679-1690. [10] GEORGE V, IONNIS P. Chaotic mixing of digital images and applications to watermarking[C]//Proceedings of the 1996 European Conference on Multimedia Applications, Services and Techniques. Louvain-La-Neuve: [s.n.], 1996:687-695. [11] TONG X, LIU Y, ZHANG M, et al. A novel chaos-based fragile watermarking for image tampering detection and self-recovery[J]. Signal Processing: Image communication, 2013, 28(3):301-308. [12] WANG L, YE Q, XIAO Y, et al. An image encryption scheme based on cross chaotic map[C]//CISP 2008: Proceedings of the 2008 Congress on Image and Signal Processing. Piscataway: IEEE Press,2008:22-26. [13] LO C C, HU Y C. A novel reversible image authentication scheme for digital images[J]. Signal Processing, 2014, 98(5):174-185. [14] YANG C, TSAI M H. Improving histogram-based reversible data hiding by interleaving predictions[J]. IET Image Processing, 2010, 4(4):223-234. [15] HSU F, WU M, YANG C, et al. Image reversibility in data embedding on the basis of blocking-predictions[J]. Peer-to-Peer Networking and Applications, 2014, 7(4):723-736. [16] WANG S, LI C, KUO W. Reversible data hiding based on two-dimensional prediction errors[J]. IET Image Processing, 2013, 7(9):805-816. |