References
- Lin, C. Y. and Chang, S. F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol., 2001, 11(2), 153–168.
- Lou, D. C. and Liu, J. L. Fault resilient and compression tolerant digital signature for image authentication. IEEE Trans. Consumer Electron., 2000, 46(1), 31–39.
- Fridric, J. Methods for tamper detection in digital image. Multimedia and Security Workshop at ACM Multimedia, Orlando, FL, 1999.
- Xi, L., Arce, G. R. and Graveman, R. F. Approximate image message authentication codes. IEEE Trans. Multimedia, 2001, 3(2), 242–252.
- Queluz, M. P. Authentication of digital images and video: generic models and a new contribution. Signal Process. Image Commun., 2001, 16, 461–475.
- Lin, C. Y. and Chang, S. F. Robust digital signature for multimedia authentication: a summary. IEEE Trans. Circ. Syst., 2003, 3(4), 23–26.
- Lu, C. S. and Liao, H. Y. Structural digital signature for image authentication: an incidental distortion resistant scheme. IEEE Trans. Multimedia, 2003, 5(2), 161–173.
- Tsa, P., Hu, Y. C. and Chang, C. C. Using set partitioning in hierarchical trees to authenticate digital images. Signal Process. Image Commun., 2003, 18, 813–822.
- Press, W. H., Teukolsky, S. A., Vetterling, W. T. and Flannery, B. P. Numerical Recipes in C: The Art of Scientific Computing, 1992 (Cambridge University Press, Cambridge).
- Ramponi, G. and Carrat, S. An adaptive irregular sampling algorithm and its application to image coding. Image Vision Comput., 2001, 19(7), 451–460.
- Seberry, J. and Pieprzk, J. Cryptography: An Introduction to Computer Security, 1989 (Prentice-Hall, New York).
- Rivest, R. L., Shami, A., and Adlema, L. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 1978, 21, 120–126.
- Cheng, H. and L, X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process., 2000, 48(8), 2439–2451.