REFERENCES
- Kunder, D. and Hatzinakos, D. Digital watermarking for telltale tamper proofing and authentication. Proc. IEEE, 1999, 87(7), 1167–1180.
- Wu, M. and Liu, B. Watermarking for image authentication. Proc. IEEE Int. Conf. Image Processing, 1998, 2, 437–441.
- Yeung, M. M. and Mintzer, F. An invisible watermarking technique for image verification. Proc. IEEE Int. Conf. Image Processing, 1997, 2, 680–683.
- Lin, C. Y. and Chang, S. F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans, on Circuits and Systems of Video Technol., 2001, 11(2), 153–168.
- Lou, D. C. and Liu, J. L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans, on Consumer Electronics, 2000, 46, 31–39.
- Lu, C. S. and Liao, H. Y. Structural digital for image authentication: an incidental distortion resistant scheme. In Proceedings of ACM Multimedia 2000 Workshop, California, 2000, pp. 115–118.
- Schneider, M. and Chang, S. F. A robust content based digital signature for image authentication. Proc. IEEE Int. Conf Image Processing, 1996, 3, 227–230.
- Yang, C. R., Hwang, M. S. and Tang, Y. L. A study to interpolate pixels for image—column and row detecting method. In the 8th National Conference on Science and Technology of National Defense, Tao-Yuan, 1999.
- Chang, C. C and Hu, Y. C. Hybrid image compression methods based on vector quantization and block truncation coding. Opt. Engng, 1999, 38(4), 591–598.
- Chao, C. W., Hsieh, C. H., Lu, P. C. and Cheng, T. A. Modified block truncation coding for image compression. Pattern Recognition Lett., 1996, 17, 1499–1506.
- Chao, C. W., Hsieh, C. H. and Lu, P. C. Image compression using modified block truncation coding algorithm. Signal Processing: Image Communication, 1998, 12, 1–11.
- Delp, E. J., Saenz, M. and Salama, P. Block truncation coding (BTC). Video and Image Processing Laboratory School of Electrical and Computer Engineering, Purdue University, West Lafayette, Indiana.
- Chen, T. S. and Chang, C. C. A new image coding algorithm using variable-rate side-match finite-state vector quantization. IEEE Trans, on Image Processing, 1997, 6(8), 1185–1187.
- Linde, Y., Buzo, A. and Gray, R. M. An algorithm for vector quantizer design. IEEE Trans, on Communs, 1980, 28, 84–95.
- Nasrabadi, N. M. and King, R. A. Image coding using vector quantization: a review. IEEE Trans, on Communs, 1988, 36, 957–971.
- Ramamurthi, B. and Gersho, A. Classified vector quantization of images. IEEE Trans, on Communs, 1986, 34, 1105–1115.
- Rivest, R., Shamir, A. and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communs of ACM, 1978, 21(2), 120–126.
- ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans, on Inf. Theory, 1985, IT-31, 469–472.