(1.College of Computer Science,National University of Defense Technology,Changsha 410073,China;2.College ofMathematics and Computer Science,Jishou University,Jishou 416000,Hunan China)
[1] WONG P W.A Public Key Watermark for Image Verification and Authentication [C].Chicago,USA:Proc. ICIP’98,1998.[2] LI C T,LOU D C,CHEN T H.Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem [C].ICIP’2000,2000.[3] KUNDUR D,HATZINAKOS D.Towards a Telltale Watermarking Technique for Tamper Proofing [C].Proc. ICIP,1998.[4] PODILCHUK C I,ZENG W.Image-Adaptive Watermarking Using Visual Models [J].IEEE Trans. on Selected Areas of Communications,1998,16(4):525-539.