[1] 华先胜,石青云.易损数字水印若干问题的研究[J].中国图像图形学报,2001,6(11):1089−1095
[2] Lin E T. A review of fragile image watermarks[C]//Proc of the Multimedia & Security Workshop.New York:ACM,1999:25−29
[3] Fridrich J. Methods for tamper detection in digital images[C] //Proc of the ACM Workshop on Multimedia and Security. New York: ACM, 1999:19−23
[4] 寇占奎,徐江峰.基于音频特征的半脆弱水印方案[J].计算机工程与设计,2012,33(9):78-80
[5] Chi K H, Li C T. Semi-fragile watermarking scheme for authentication of JPEG images[C]//Proc of the Int Conf on Information Technology: Coding and Computing. Piscaterway,NJ: IEEE. 2004:7−11
[6] 张静,张春田.用于JPEG2000 图像认证的半脆弱性数字水印算法[J].电子学报,2004,32(1):157−160
[7] 胡军全.脆弱水印的方法及其应用[D].广州:中山大学,2003
[8] 张劲松,杨玫,周立新.基于DWT的图像内容半脆弱水印认证算法[J].科技通报,2017,33(6):192-195
[9] Lin CY, Chang SF. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Trans on Circuits and Systems of Video Technology, 2001,11(2):153−168