G.L. Friedman, The trustworthy digital camera: Restoring credibility to the photographic image,IEEE Trans. on Consumer Electronics, 1993, 39(4), 905-910.[2]R.G. Schyndel, A. Z. Tirkel, C. F. Osborne, A digital watermark, In: Proc ICIP, Austin, Texas,1994, vol.2, 86-90.[3]M. Yeung, F. Mintzer, An invisible watermarking technique for image verification, In: Proc ICIP,Santa Barbara, California, 1997, 680-683.[4]M. Holliman, N. Memon, Counterfeiting attacks for block-wise independent watermarking techniques, IEEE Trans. on Image Processing, 2000, 9(3), 432-441.[5]J. Fridrich, M. Goljan, N. Memon, Further attacks on Yeung-Mintzer watermarking scheme, In:Proc. SPIE Photonic West, Electronic Imaging 2000, Security and Watermarking of Multimedia Contents, San Jose, California, January 24-26, 2000, 428-437.J. Fridrich, M. Goljan, A. C. Baldoza, New fragile authentication watermark for images, In: Proc ICIP, Vancouver, Canada, September 10-13, 2000, 446-449.
|