
REFERENCES
Bartolini, F., Tefas, A., Barni, M., and Pitas, I. (2001)
“Image authentication techniques for surveillance
applications,” Proc. IEEE, vol. 89, no. 10, pp.
1403−1418.
Bhattacharjee, S. and Kutter, M. (1998) “Compression
tolerant image authentication,” Int. Conf. Image
Processing, vol. 1, pp. 435−439.
Celik, M.U., Sharma, G., Saber, E., and Tekalp, A.M.
(2002), “Hierarchical watermarking for secure
image authentication with localization,” IEEE Trans.
Image Processing, vol. 11, no. 6, pp. 585−595.
Chotikakamthorn, N. and Sangiamkun, W. (2001)
“Digital watermarking technique for image
authentication by neighbouring block similarity
measure,” Int. Conf. Electrical and Electronic
Technology, vol. 2, pp. 743−747.
El-Din, S.N. and Moniri, M. (2002) “Fragile and
semi-fragile image authentication based on image
self-similarity,” Int. Conf. Image Processing, vol. 2,
pp. 897−900.
Fridrich, J., Goljan, M., and Du, R. (2001) “Invertible
authentication watermark for JPEG images,” Int.
Conf. Coding and Computing, pp. 223−227.
Holliman, M. and Memon, N. (2000) “Counterfeiting
attacks on oblivious block-wise independent
invisible watermarking schemes,” IEEE Trans.
Image Processing, vol. 9, pp. 432−441.
Kundur, D. and Hatzinakos, D. (1999) “Digital
watermarking for telltale tamper proofing and
authentication,” Proceedings of the IEEE, vol. 87, pp.
1167−1180.
Lin, E.T. and Delp, E.J. (1999) “A review of fragile
image watermarks,” Multimedia and Security
Workshop (ACM Multimedia ’99) Multimedia
Contents, pp. 25−29.
Lin, E.T., Podilchuk, C.I., and Delp, E.J. (2000)
“Detection of image alteration using semi-fragile
watermarks. SPIE Conf. Security and Watermarking
of Multimedia Content II, vol. 3971, pp. 152−163.
Queluz, M.P. (1999) “Content-based integrity protection
of digital images,” SPIE Conf. Security and
Watermarking of Multimedia Contents, vol. 3657,
pp. 88−93.
Sun, Q. and Chang, S.-F. (2002) “Semi-fragile image
authentication using generic wavelet domain
features and ECC,” Int. Conf. Image Processing, vol.
2, pp. 901−904.
Wong, P.W. (1999) “A watermark for image integrity
and ownership verification,” IS&T Image
Processing, Image Quality, Image Capture, Systems
Conference, pp. 374−379.
Yeung, M. and Mintzer, F. (1997) “An invisible
watermarking technique for image verification,” Int.
Conf. Image Processing, vol. 2, pp.680−683.
Yu, G.J., Lu, C.S., Liao, H.Y. Mark, and Sheu, J.P. (2000)
“Mean quantization blind watermarking for image
authentication,” Int. Conf. Image Processing, vol. 3,
pp. 706−709.
IMAGE AUTHENTICATION USING HIERARCHICAL SEMI-FRAGILE WATERMARKS
289