[1] Satendra Pal Singh and Gaurav Bhatnagar. A new robust watermarking system in integer dct domain. Journal of Visual Communication and Image Representation, 53:86–101, 2018.
[2] Xiaobing Kang, Yajun Chen, Fan Zhao, and Guangfeng Lin. Multi-dimensional particle swarm optimization for robust blind image watermarking using intertwining logistic map and hybrid domain. Soft Computing, 24(14):10561–10584, 2020.
[3] Phen Lan Lin, Chung-Kai Hsieh, and Po-Whei Huang. A hierarchical digital watermarking method for image tamper detection and recovery. Pattern recognition, 38(12):2519–2529, 2005.
[4] Tien-You Lee and Shinfeng D Lin. Dual watermark for image tamper detection and recovery. Pattern recognition, 41(11):3497–3506, 2008.
[5] Dipabali Sarkar, Sarbani Palit, Sukalyan Som, and KN Dey. Large scale image tamper detection and restoration. Multimedia Tools & Applications, 79, 2020.
[6] Chi-Shiang Chan. An image authentication method by applying hamming code on rearranged bits. Pattern Recognition Letters, 32(14):1679–1690, 2011.
[7] Chi-Shiang Chan and Chin-Chen Chang. An efficient image authentication method based on hamming code. Pattern Recognition, 40(2):681–690, 2007.
[8] Surya Bhagavan Chaluvadi and Munaga VNK Prasad. Efficient image tamper detection and recovery technique using dual watermark. In 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), pages 993–998. IEEE, 2009.
[9] Faranak Tohidi and Manoranjan Paul. A new image watermarking scheme for efficient tamper detection, localization and recovery. In 2019 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), pages 19–24. IEEE, 2019.
[10] Irshad Ahmad Ansari, Millie Pant, and Chang Wook Ahn. Svd based fragile watermarking scheme for tamper localization and self-recovery. International Journal of Machine Learning and Cybernetics, 7(6):1225–1239, 2016.
[11] Durgesh Singh and Sanjay K Singh. Dct based efficient fragile watermarking scheme for image authentication and restoration. Multimedia Tools and Applications, 76(1):953–977, 2017.
[12] Behrouz Bolourian Haghighi, Amir Hossein Taherinia, and Amir Hossein Mohajerzadeh. Trlg: Fragile blind quad watermarking for image tamper detection and recovery by providing compac digests with optimized quality using lwt and ga. Information Sciences, 486:204–230, 2019.
[13] Navid Daneshmandpour, Habibollah Danyali, and Mohammad Sadegh Helfroush. Image tamper detection and multi-scale self-recovery using reference embedding with multi-rate data protection. China Communications, 16(11):154–166, 2019.
[14] Vishal Rajput and Irshad Ahmad Ansari. Image tamper detection and self-recovery using multiple
median watermarking. Multimedia Tools and Applications, 79(47):35519–35535, 2020.
[15] Assem Abdelhakim, Hassan I Saleh, and Mai Abdelhakim. Fragile watermarking for image tamper detection and localization with effective recovery capability using k-means clustering. Multimedia Tools and Applications, 78(22):32523–32563, 2019.
[16] Omer Hemida and Hongjie He. A self-recovery watermarking scheme based on block truncation
coding and quantum chaos map. Multimedia Tools & Applications, 79, 2020.
[17] Imran Sikder, Pranab Kumar Dhar, and Tetsuya Shimamura. A semi-fragile watermarking method using slant transform and lu decomposition for image authentication. In 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), pages 881–885. IEEE, 2017.
[18] Richard W Hamming. Error detecting and error correcting codes. The Bell system technical journal, 29(2):147–160, 1950.
[19] Zhou Wang, Eero P Simoncelli, and Alan C Bovik. Multiscale structural similarity for image quality assessment. In The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003, volume 2, pages 1398–1402. Ieee, 2003.