A Survey of Watermarking Algorithms for Image Authentication, EURASIP Journal on Advances in Signal Processing, vol.2002, issue.6, pp.613-621, 2002. ,
DOI : 10.1155/S1110865702204047
Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, vol.25, issue.16, pp.1893-1903, 2004. ,
DOI : 10.1016/j.patrec.2004.08.017
A hierarchical digital watermarking method for image tamper detection and recovery, Pattern Recognition, vol.38, issue.12, pp.2519-2529, 2005. ,
DOI : 10.1016/j.patcog.2005.02.007
Optimal Watermark Embedding and Detection Strategies Under Limited Detection Resources, IEEE Transactions on Information Theory, vol.54, issue.1, 2008. ,
DOI : 10.1109/TIT.2007.911210
URL : http://arxiv.org/abs/0705.1919
Hierarchical watermarking for secure image authentication with localization, IEEE Transactions on Image Processing, vol.11, issue.6, pp.585-595, 2002. ,
DOI : 10.1109/TIP.2002.1014990
Fragile image watermarking using a gradient image for improved localization and security, Pattern Recognition Letters, vol.25, issue.16, pp.1893-1903, 2004. ,
DOI : 10.1016/j.patrec.2004.08.017
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, vol.185, issue.2, pp.869-882, 2007. ,
DOI : 10.1016/j.amc.2006.07.036
A majority-voting based watermarking scheme for color image tamper detection and recovery, Computer Standards & Interfaces, vol.29, issue.5, pp.561-570, 2007. ,
DOI : 10.1016/j.csi.2006.11.009
Invisible watermarking for image verification, Journal of Electronic Imaging, vol.7, issue.3, pp.578-591, 1998. ,
DOI : 10.1117/1.482612
Transparent robust image watermarking, Proceedings of 3rd IEEE International Conference on Image Processing, pp.211-214, 1996. ,
DOI : 10.1109/ICIP.1996.560421
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.3895
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes, IEEE Transactions on Image Processing, vol.9, issue.3, pp.432-441, 2000. ,
DOI : 10.1109/83.826780
Synchronous counterfeiting attacks on selfembedding watermarking schemes, Internetional Journal. Computer Science and Network Security, vol.6, issue.1, pp.251-257, 2006. ,
Hash-Based Identification of Sparse Image Tampering, IEEE Transactions on Image Processing, vol.18, issue.11, pp.2491-2504, 2009. ,
DOI : 10.1109/TIP.2009.2028251
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.154.6767
Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition, IEEE Transactions on Instrumentation and Measurement, vol.59, issue.11, pp.3060-3063, 2010. ,
DOI : 10.1109/TIM.2010.2066770
A Computational Model for Watermark Robustness, LNCS, vol.4437, pp.145-160, 2006. ,
DOI : 10.1007/978-3-540-74124-4_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.3791
Fragile watermarking scheme using a hierarchical mechanism, Signal Processing, vol.89, issue.4, pp.675-679, 2009. ,
DOI : 10.1016/j.sigpro.2008.10.001
A new semi-fragile image watermarking with robust tampering restoration using irregular sampling, Signal Processing: Image Communication, vol.22, issue.5, pp.515-528, 2009. ,
DOI : 10.1016/j.image.2007.03.004
Performance Analysis of a Block-Neighborhood-Based Self-Recovery Fragile Watermarking Scheme, IEEE Transactions on Information Forensics and Security, vol.7, issue.1, pp.185-196, 2012. ,
DOI : 10.1109/TIFS.2011.2162950
Channel model for watermarks subject to desynchronization attacks, Proc. SPIE, Security and Watermarking of Multimedia Contents IV, pp.281-292, 2002. ,
DOI : 10.1117/12.465286
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.2408