3Yeung M, Mintzer F. An invisible watermarking technique for image verification. In: Proceedings of ICIP′97, Santa Barbara,California, 1997. 680-683. 被引量:1
4Wong P W, Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification.IEEE Transactions on Image Processing, 2001, 10(10): 1593-1601. 被引量:1
5Schneider M, Chang S-F. A robust content based digital signature for image authentication. In: Proceedings of ICIP, Laussane, Switzerland, 1996. 227-230. 被引量:1
6Bhattacha S, Kutter M. Compression tolerant image authentication. In: Proceedings of ICIP, Chicago, 1998. 435-439. 被引量:1
7Fridrich J. Image watermarking for tamper detection. In: Proceedings of ICIP'98, Chicago, 1998. 404-408. 被引量:1
8Kundur D, Hatzinakos D. Digital watermarking for telltale tamper proofing and authentication. Proceedings of IEEE,1999, 87(7): 1167-1180. 被引量:1
9Xie L, Arce G R, Graveman R F. Approximate image message authentication codes. IEEE Transactions on Multimedia, 2001,3(2) : 242-252. 被引量:1
10Arce G R, Xie L, Graveman R F. Approximate image authentication codes. In: Proceedings of the 4th Annual Fedlab Symposium Advanced Telecommunications/Information Distribution,College Park, MD, 2000. 被引量:1