Kamran, Asifullah K, Sana A M, “A high capacity reversible watermarking approach for authenticating images, Exploiting down-sampling, histogram processing, and block selection”, Information Sciences, VOL. 256, NO.1, 2014, pp.162-183.10.1016/j.ins.2013.07.035
Wang X, Pang K, Zhou X, et al. “A visual model based perceptual image hash for content authentication”, IEEE Transactions on Information Forensics and Security, VOL.10, NO.1, 2015, pp.1336-1349.10.1109/TIFS.2015.2407698
Lo C C, Hu Y C. “A novel reversible image authentication scheme for digital images”, Signal Processing, VOL. 98, NO.5, 2014, pp.174-185.10.1016/j.sigpro.2013.11.028
Farid H. “Exposing digital forgeries in scientific images”, Proceedings of the 8th workshop on Multimedia and security, Geneva, Switzerland, ACM, 2006, pp.29-36.10.1145/1161366.1161374
Johnson M K, Farid H. “Detecting photographic composites of people” Proceedings of the 6th International Workshop on Digital Watermarking, IWDW 2007. Guangzhou, China, Springer Berlin Heidelberg, 2008, 5041 LNCS: 19-33.10.1007/978-3-540-92238-4_3
Swaminathan A, Mao Y, Wu M., “Robust and secure image hashing”, IEEE Transactions on Information Forensics and Security, VOL.1, NO.2, 2006, pp.215-230.10.1109/TIFS.2006.873601
Monga V, Evans B L. “Perceptual image hashing via feature points: performance evaluation and tradeoffs”, IEEE Transactions on Image Processing, VOL. 15, NO.11, 2006, pp.3452-3465.10.1109/TIP.2006.881948
Candès E J, Romberg J, Tao T. “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information”, IEEE Transactions on Information Theory, VOL. 52, NO.2, 2006, pp.489-509.10.1109/TIT.2005.862083
Kundur D, Hatzinakos D. “Digital watermarking for telltale tamper proofing and authentication”, Proceedings of the IEEE, Vol. 87, No.7, 1999, pp.1167-1180.10.1109/5.771070
Celik M U, Sharma G, Saber E, et al. “Hierarchical watermarking for secure image authentication with localization”, IEEE Transactions on Image Processing, VOL. 11, NO.6, 2002, pp.585-595.10.1109/TIP.2002.101499018244657
Valenzise G, Tagliasacchi M, Tubaro S, et al. “A compressive-sensing based watermarking scheme for sparse image tampering identification”, Proceedings of the 2009 IEEE International Conference on Image Processing, ICIP 2009, Cairo, Egypt, IEEE, 2009,pp.1265-1268.10.1109/ICIP.2009.5413615
Zhang X, Qian Z, Ren Y, et al. “Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction”, IEEE Transactions on Information Forensics and Security, VOL. 6, NO.4,2011,pp.1223-1232.10.1109/TIFS.2011.2159208
Sheikh M, Baraniuk R G. “Blind error-free detection of transform-domain watermarks”, Proceedings of the 2007 IEEE International Conference on Image Processing, ICIP 2007, San Antonio, TX, United states, IEEE, 2007, 5, pp.453-456.10.1109/ICIP.2007.4379863
Schaefer G; Stich M. “UCID-an uncompressed colour image database”, Proceedings of SPIE, Storage and Retrieval Methods and Applications for Multi-media, San Jose, CA, United states, The International Society for Optical Engineering, 2004, 5307, pp.472-480.
Wenqing,Chen, Tao Wang and Bailing Wang, “Design of digital image encryption algorithm based on mixed chaotic sequences”, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO.4, pp. 1453-1469, 2014.
Yanmin LUO, Peizhong LIU and Minghong LIAO, “An artificial immune network clustering algorithm for mangroves remote sensing”, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, No. 1, pp. 116-134, 2014.10.21307/ijssis-2017-648
Daode Zhang et al., “Research on chips defect extraction based on image-matching”, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO.1, 2014, pp.321-336.10.21307/ijssis-2017-658