logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 5: 059104(2016) https://doi.org/10.1007/s11432-016-5542-8

Semi-fragile watermarking for image authentication based on compressive sensing

More info
  • ReceivedSep 27, 2015
  • AcceptedNov 24, 2015
  • PublishedApr 8, 2016

Abstract


Funded by

National High Technology Research and Development Program of China(2014BAK11B03)

National Basic Research Program of China(2013CB329305)

National Natural Science Foundation of China(61422213)

National Natural Science Foundation of China(61170185)

``Strategic Priority Research Program" of the Chinese Academy of Sciences(XDA06010701)


Acknowledgment

Acknowledgments

This work was supported by National High Technology Research and Development Program of China (Grant No. 2014BAK11B03), and National Basic Research Program of China (Grant No. 2013CB329305), National Natural Science Foundation of China (Grant Nos. 61422213, 61170185), and ``Strategic Priority Research Program" of the Chinese Academy of Sciences (Grant No. XDA06010701).


References

[1] Li J, Li X L, Yang B, et al. IEEE Trans Inf Foren Secur, 2015, 10: 507-518 Google Scholar

[2] Ren Y J, Shen J, Zheng Y H, et al. Efficient data integrity auditing for storage security in mobile health cloud. Peer-to-Peer Netw Appl, in press. doi: 10.1007/s12083-015-0346-y. Google Scholar

[3] Guo P, Wang J, Li B, et al. J Internet Tech, 2014, 15: 929-936 Google Scholar

[4] Xia Z H, Wang X H, Sun X M, et al. Steganalysis of LSB matching using differencesbetween nonadjacent pixels. Multimedia Tools Appl, in press. doi: 10.1007/s11042-014-2381-8. Google Scholar

[5] Pan Z Q, Zhang Y, Kwong S. IEEE Trans Broadcast, 2015, 61: 166-176 Google Scholar

[6] Liu S, Song Z, Liu G, et al. Street-to-shop: cross-scenario clothing retrieval via parts alignment and auxiliary set. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Providence, 2012. 3330-3337. Google Scholar

[7] Chamlawi R, Khan A, Idris A. J Comput Sci Tech, 2007, 22: 795-804 Google Scholar

[8] Lv L, Fan H, Wang J, et al. J Theor Appl Inf Tech, 2012, 42: 287-291 Google Scholar

[9] Zhao G H, Shen F F, Wang Z Y, et al. Sci China Inf Sci, 2013, 56: 112103 Google Scholar

[10] Li Y, Du L. Semi-fragile watermarking for image tamper localization and self-recovery. In: Proceedings of International Conference on Security, Pattern Analysis, and Cybernetics (SPAC), Wuhan, 2014. 328-333. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号