References
- Chang CC, Fan YH and Tai WL. Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn., 2008, 41, 654–661.
- Celik MU, Sharmar G and Tekalp AM. Hierarchical Watermarking for secure image authentication with localization. IEEE Trans. Image Process., 2002, 11, (6), 585–594.
- Patra JC, Phua JE and Bornand C. A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression. Digit. Signal Process., 2010, 20, 1597–1611.
- Chan CS and Chang CC. An efficient image authentication method based on Hamming Code. Pattern Recogn., 2007, 40, (2), 681–690.
- Lee TY and Lin SD. Dual watermark for image tamper detection and recovery. Pattern Recogn., 2008, 41, 3497–3506.
- Wang SS and Tsai SL. Automatic image authentication and recovery using fractal code embedding and image inpainting. Pattern Recogn., 2008, 41, 701–712.
- Yang CW and Shen JJ. Recover the tampered image based on VQ indexing. Signal Process., 2010, 90, 331–343.
- Hamming RW. Error detecting and error correcting codes. Bell Syst. Tech. J., 1950, 26, (2), 147–160.
- Chan CS. An image authentication method by applying Hamming Code on rearranged bits. Pattern Recogn. Lett., 2011, 32, 1679–1690.
- Lin RD, Chen TH, Huang CC, Lee WB and Chen WS. A secure image authentication scheme with tampering proof and remedy based on Hamming Code. Int. J. Innov. Comput. Inform. Control, 2009, 5, (8), 1349–4198.
- Voyatzis G and Pitas I. Chaotic mixing of digital images and applications to watermarking. Proc. Eur. Conf. Multimed. Appl., 1996, 2, 687–695.
- Thien CC. and Lin J.C. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn., 2003, 36, (12), 2875–2881.
- Serra J. Image Analysis and Mathematical Morphology, 1982 (Academic Press, New York).