Cox I J and Miller M L. The first 50 years of electronicwatermarking. EURASIP Journal on Applied SignalProcessing, 2002, 9(2): 126-132.[2]Licks V and Jordan R. Geometric attacks on imagewatermarking systems[J].IEEE Multimedia.2005, 12(3):68-78[3]Oruanaidh J J K and Pun T. Rotation, scale and translationinvariant spread spectrum digital image watermarking[J].Signal Processing.1998, 66(3):303-317[4]桑茂栋, 赵耀. 基于几何矩的抵抗RST 攻击的数字图像水印.电子与信息学报, 2007, 29(4): 76-80.Sang Mao-dong and Zhao Yao. Moment based multibitdigital image watermarking resisting to RST attacks. Journalof Electronics Information Technology, 2007, 29(4): 76-80.[5]Zhang L, Qian G B, and Xiao W W, et al.. Geometricinvariant blind image watermarking by invariant Tchebichefmoments[J].Optical Express.2007, 15(5):2251-2261[6]Pereira S and Pun T. Robust template matching for affineresistant image watermarks. IEEE Trans. on ImageProcessing, 2000, 9(6): 1123-1129.[7]Bas P, Chassery J M, and Macq B. Geometrically invariantwatermarking using feature points. IEEE Trans. on ImageProcessing, 2002, 11(9): 1014-1028.[8]Tang C W and Hang H M. A feature-based robust digitalimage watermarking scheme[J].IEEE Trans. on SignalProcessing.2003, 51(4):950-959[9]Li L D, Guo B L, and Shao K. Geometrically robust imagewatermarking using scale-invariant feature transform andZernike moments. Chinese Optics Letters, 2007, 5(6):332-335.[10]Lowe D G. Distinctive image features from scale-invariantkeypoints[J].International Journal of Computer Vision.2004,60(2):91-110[11]Kundur D and Hatzinakos D. Digital watermarking fortelltale tamper proofing and Authentication[J].Proc. IEEE.1999, 87(7):1167-1180[12]Yu G J, Lu C S, and Liao H Y M. Mean-quantization-basedfragile watermarking for image authentication. OpticalEngineering, 2001, 40(7): 1396-1408.
|