[1] R. B. Wolfgang, C. I. Podilchuk,E. J. Delp, “Perceptual Watermarks for Digital Images and Video,” Proceedings of the IEEE, Vol. 87, No. 7, pp. 1108-1126, 1999 [2] W. B. Li, H. W. Pan, P. Y. Li, X. Q. Xie,Z. Q. Zhang, “A Medical Image Retrieval Method based on Texture Block Coding Tree,”Signal Processing: Image Communication, Vol. 59, pp. 131-139, 2017 [3] L. L. Gao, H. W. Pan, Q. Li, X. Q. Xie, Z. Q. Zhang, J. M. Han, et al., “Brain Medical Image Diagnosis based on Corners with Importance-Values,” BMC Bioinformatics, Vol. 18, No. 1, pp. 505, 2017 [4] R. G.Van-Schydel, A. Z. Tirkel, and C. F. Osborne, “A Digital Watermark,” inProceedings of IEEE International Conference on Image Processing, No. 2, pp. 86-90, 1994 [5] I. Cox and J. Kilian, “Secure Spread Spectrum Watermarking for Images, Audio and Video,” inProceedings of IEEE International Conference on Image Processing, 1996 [6] I. Cox, J. Kilian,T. Leighton, “Secure Spread Spectrum Watermarking for Multimedia,” IEEE Transaction on Image Processing, Vol. 6, No. 12, pp. 1673-1687, 1997 [7] J. Ruanaidh, W. Dowling,F. Boland, “Phase Watermarking of Digital Image,” inProceedings of IEEE International Conference on Image Processing, 1999 [8] D. Kudur and D. Hatzinakos, “A Robust Digital Image Watermarking Method using Wave Let-based Fusion,” in Proceedings of International Conference on Image Processing, pp. 544-547, 1997 [9] B. Zhao and G. H. Qing, “High Robustness Image Watermarking Algorithm,” Journal of Jilin University Engineering and Technology Edition, Vol. 47, No. 1, pp. 249-254, 2017 [10] Q. M. Zheng, X. Jin, G. M. Gu,F. H. Wang, “A Digital Watermarking Algorithm based on Data Matrix,” Journal of China University of Petroleum, Vol. 39, No. 1, pp. 188-193, 2015 [11] P. Wang, H. Yao,L. Li, “An Adaptive Digital Watermarking Algorithm Combining Spatial and DWT Domain,” Optics Precision Engineering, Vol. 14, No. 6, pp. 1057-1062, 2006 [12] K. Loukhaoukha, M. Nabti,K. Zebbiche, “A Robust SVD-based Image Watermarking using a Multi-Objective Particle Swarm Optimization,” Opto Electronics Review, Vol. 22, No. 1, pp. 45-54, 2014 [13] J. N. Wu, S. G. Wang, D. Zhang, G. X. Liu,Y. Zhou, “Binary Image Watermarking with True Randomness of Quantum Key,” Optical Precision Engineering, Vol. 25, No. 11, pp. 2968-2974, 2017 [14] C. H.Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” inProceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, 1984 [15] J. N. Wu, G. X. Liu, S. G. Wang, R. K. Wei, J. W. Han,L. J. Song, “Quantum Cryptography Network Flow Control Strategy based on BB84 Protocol,” Journal of Jilin University: Science Edition, Vol. 52, No. 1, pp. 76-80, 2014 [16] H. J.He and J. S. Zhang, “Self-Embedding Watermarking Algorithm with Robustness Against Watermark Information Alterations,” Journal of Software, Vol. 20, No. 2, pp. 437-450, 2009 [17] X. D. Zhang, G. D. Lu,J. Feng, “Fundamentals of Image Coding and Wavelet Compressing: Principles, Algorithms and Standards,” Tsinghua University Press, pp. 235-270, Beijing, 2004 [18] V. I.Arnold and A. Avez, “Ergodic Problems of Classical Mechanics,” Mathematical Physics Monograph Series, W. A. Benjamin, New York Inc., 1968 [19] D. X. Qi, “Fractal and its Application,” Science Press, pp. 143- 145, Beijing, 1994 [20] D. X. Qi, J. C. Zou,X. Y. Han, “A New Class of Scrambling Transformation and Its Application in the Image Information Covering,” Science in China (Series E), Vol. 43, No. 3, pp. 304-312, 2000 [21] C. M. Wu, “Improvement of Discrete Arnold Transform and Its Application in Image Scrambling Encryption,” Acta Physica Sinica, Vol. 63, No. 9, 2014 [22] Z. G.Ma and Y. S. Qiu, “An Image Cryptosystem based on General Cat Map,” Journal of China Institute of Communications, Vol. 24, No. 2, pp. 51-57, 2003 [23] D. X. Qi, “Matrix Transformation and its Applications to Image Hiding,” Journal of North China University of Technology, Vol. 11, No. 1, pp. 24-28, 1999 [24] Y. H. Wang, C. Q. Zhu, S. B. Su,K. M. Ding, “An Authentication Method based on Perceptual Hashing and Watermarking for Remote Sensing Image,” Optics Precision Engineering, Vol. 24, No. 10, pp. 640-648, 2016 [25] Y. X.Gu and X. H. Ma, “Digital Watermarking Algorithm using Sparse Transform and Laplacian Pyramid,” Journal of Computer-Aided Design & Computer Graphics, Vol. 30, No. 5, pp. 901-910, 2018 |