[1] |
BARNI M , BARTOLINI F , COX I J ,et al. Digital watermarking for copyright protection:communications perspective[J]. IEEE Communications Magazine, 2001,39(8): 90-91.
|
[2] |
NIKOLAIDIS N ,et al. Robust image watermarking in the spatial domain[J]. Signal Processing, 1998,66(3): 385-403.
|
[3] |
ZHANG W Y . Semi-fragile spatial watermarking based on local binary pattern operators[J]. Optics Communications, 2011,284(16/17): 3904-3912.
|
[4] |
COX I J , KILIAN J , LEIGHTON F T ,et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997,6(12): 1673-1687.
|
[5] |
HSU C T , WU J L . Hidden digital watermarks in images[J]. IEEE Transactions on Image Processing, 1999,8(1): 58-68.
|
[6] |
HUANG J W , SHI Y Q , SHI Y . Embedding image watermarks in dc components[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2000,10(6): 974-979.
|
[7] |
CHU W C . DCT-based image watermarking using subsampling[J]. IEEE Transactions on Multimedia, 2003,5(1): 34-38.
|
[8] |
AHMED N , NATARAJAN T , RAO K R . Discrete cosine transform[J]. IEEE Transactions on Computers, 1974,23(1): 90-93.
|
[9] |
BYUN S W , SON H S , LEE S P . Fast and robust watermarking method based on DCT specific location[J]. IEEE Access, 2019,7: 100706-100718.
|
[10] |
COX I , MILLER M , BLOOM J ,et al. Digital watermarking and steganography[M]. Morgan Kaufmann Publishers Inc, 2007.
|
[11] |
NEZHADARYA E , WANG Z J , WARD R K . Robust image watermarking based on multiscale gradient direction quantization[J]. IEEE Transactions on Information Forensics and Security, 2011,6(4): 1200-1213.
|
[12] |
CHANG C C . SVD-based digital image watermarking scheme[J]. Pattern Recognition Letters, 2005,26(10): 1577-1586.
|
[13] |
MOHAMMAD A A , ALHAT S S . An improved SVD-based watermarking scheme for protecting rightful ownership[J]. Signal Processing, 2008,88(9): 2158-2180.
|
[14] |
NI R R , RUAN Q Q , LIU J Q . Tampering estimation watermarking based on lifting wavelet and chaotic sequence[C]// Proceedings of 2006 8th International Conference on Signal Processing. 2006.
|
[15] |
GU Q L , GAP T G . A novel reversible robust watermarking algorithm based on chaotic system[J]. Digital Signal Processing, 2013,23(1): 213-217.
|
[16] |
SEO J S , YOO C D . Image watermarking based on invariant regions of scale-space representation[J]. IEEE Transactions on Signal Processing, 2006,54(4): 1537-1549.
|
[17] |
LU C S , SUN S W , HSU C Y ,et al. Media hash-dependent image watermarking resilient against both geometric attacks and estimation attacks based on false positive-oriented detection[J]. IEEE Transactions on Multimedia, 2006,8(4): 668-685.
|
[18] |
LIN C Y , WU M , BLOOM J A ,et al. Rotation,scale,and translation resilient watermarking for images[J]. IEEE Transactions on Image Processing:a Publication of the IEEE Signal Processing Society, 2001,10(5): 767-782.
|
[19] |
ZHENG D , ZHAO J , EL SADDIK A . RST-invariant digital image watermarking based on log-polar mapping and phase correlation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8): 753-765.
|
[20] |
KIM H S , LEE H K . Invariant image watermark using Zernike moments[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2003,13(8): 766-775.
|
[21] |
XIN Y Q , LIAO S , PAWLAK M . A multibit geometrically robust image watermark based on Zernike moments[C]// Proceedings of the 17th International Conference on Pattern Recognition. 2004: 861-864.
|
[22] |
XIN Y , LIAO S , PAWLAK M . Geometrically robust image watermarking on a circular domain[J]. Pattern Recognition, 2007,40(1): 3740-3752.
|
[23] |
GOLABI S . Non-unit mapped radial moments platform for robust,geometric invariant image watermarking and reversible data hiding[J]. Information Sciences, 2018,447: 104-116.
|
[24] |
ZHU J , RUSSELL K , JUSTIN J ,et al. Hidden:hiding data with deep networks[C]// Proceedings of ECCV. 2018: 682-697.
|
[25] |
GOODFELLOW I J , JEAN P A , MEHDI M ,et al. Generative adversarial nets[C]// Proceedings of the 27th International Conference on Neural Information Processing Systems. 2014: 2672-2680.
|
[26] |
TANCIK M , MILDENHALL B , NG R . StegaStamp:invisible hyperlinks in physical photographs[C]// Proceedings of 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). 2020: 2114-2123.
|
[27] |
RONNEBERGER O , FISCHER P , BROX T . U-Net:convolutional networks for biomedical image segmentation[C]// Proceedings of Medical Image Computing and Computer-Assisted Intervention-MICCAI 2015. 2015: 234-241.
|
[28] |
HUISKES M J , LEW M S . The MIR flickr retrieval evaluation[C]// Proceedings of the 1st ACM International Conference on Multimedia Information Retrieval. 2008: 39-43.
|