[1] |
Zhao Xiang, Hao Lin. Overview of digital watermark[J].Computer Engineering and Design, 2006,27(11):19461950. (in Chinese)
|
[2] |
Chen Mingqi, Niu Xinxin , Yang Yixian. The research developments and applications of digital watermarking [J].Journal of China Institute of Communications, 2001, 22(5):7179. (in Chinese)
|
[3] |
Van Schyndel R G, Tirkel A Z, Osbome C F. A digital watermark[C]∥Proc of International Conference on Image Processing,1994:86.
|
[4] |
Bender W, Gruhl D, Morimoto N, et al. Technique for data hiding[R].Massachusetts Institute of Technology Media Lab,1994:313.
|
[5] |
Cox I J,Killian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673.
|
[6] |
Koch E,Zhao J.Towards robust and hidden image copyright labeling[C]∥Proc of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, 1995:1.
|
[7] |
Ye Chuan, Shen Yiqing, Li Hao, et al. A DWT digital watermarking algorithm based on HVS [J]. Journal of Zhejiang University(Science Edition),2013,40(2):152155.(in Chinese)
|
[8] |
Ji Yan.Adaptive blind watermarking based on DCT[J].Computer Science,2013,40(7):129131.(in Chinese)
|
[9] |
Ma Rongfei. DCT domainbased digital watermarking algorithm[J]. Computer Applications and Software,2012,29(6):285287. (in Chinese)
|
[10] |
Zhang Li,Xiao Jiawei,Luo Jingyun. Blind watermarking algorithm for digital image based on discrete wavelet transform and singular vector decomposition[J].Journal of Computer Applications,2013,33(S2):150152. (in Chinese)
|
[11] |
Chen Jingrun. Elementary number theory Ⅰ[M].Beijing: Science Press, 1978. (in Chinese)
|
[12] |
Liu Yuan. Applications of Chinese remainder theorem in cryptography[D]. Xining:Qinghai Normal University,2012. (in Chinese)
|
[13] |
Huang Xueyuan. Research on application of the Chinese remainder theorem in cryptography[D]. Hangzhou:Zhejiang University, 2006. (in Chinese)
|
[14] |
Chen Zewen, Zhang Longjun, Wang Yumin, et al. A group signature scheme based on Chinese remainder theorem[J]. Acta Electronica Sinica , 2004, 32(7):16021605. (in Chinese)
|
[15] |
Chen Chen. The research of weighted threshold secret sharing based on general Chinese remainder theorem[D]. He fei: Hefei University of Technology, 2012. (in Chinese)
|
[16] |
Zhang Guifang, Sun Xingming, Xiao Xiangrong, et al. Database watermarking based on Chinese remainder theorem[J]. Computer Engineering and Applications, 2006, 42(7):135136. (in Chinese)
|
[17] |
Yuan Weiqi, Huang Jing, Sang Haifeng. Palmprint recognition based on wavelet decomposition and PCA[J]. Application Research of Computers, 2008, 25(12):36713673.(in Chinese)
|
[18] |
Liu Tao,Yang Fengbao. Application of principle component analysis to image compression[J]. Natural Sciences Journal of Harbin Normal University,2008,24(4):6971.(in Chinese)
|
[19] |
Yang Shiyuan, Wu Dehui,Su Haitao. Abnormal pattern recognition method for control chart based on principal component analysis and support vector machine[J]. Journal of System Simulation, 2006, 18(5):13241328.(in Chinese)
|
|
附中文参考文献:
|
[1] |
赵翔,郝林.数字水印综述[J].计算机工程与设计,2006,27(11):19461950.
|
[2] |
陈明奇,钮心忻,杨义先.数字水印的研究进展和应用[J].通信学报,2001,22(5):7179.
|
[7] |
叶闯,沈益青,李豪,等.基于人类视觉特性(HVS)的离散小波变换(DWT)数字水印算法[J].浙江大学学报(理学版),2013,40(2):152155.
|
[8] |
季燕.基于DCT的自适应盲数字水印[J].计算机科学,2013,40(7):129131.
|
[9] |
马荣飞.基于DCT域的数字水印算法[J].计算机应用与软件,2012,29(6):285287.
|
[10] |
张力,萧嘉慰,罗静云.基于离散小波变换和奇异值分解的盲水印算法[J].计算机应用,2013,33(S2):150152.
|
[11] |
陈景润.初等数论Ⅰ[M].北京: 科学出版社, 1978.
|
[12] |
刘媛.中国剩余定理在密码学中的应用研究[D]. 西宁:青海师范大学,2012.
|
[13] |
黄学渊.中国剩余定理在密码技术中的运用[D].杭州:浙江大学,2006.
|
[14] |
陈泽文,张龙军,王育民,等.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):16021605.
|
[15] |
陈琛.基于广义中国剩余定理的加权门限秘密共享研究[D].合肥:合肥工业大学,2012.
|
[16] |
张桂芳,孙星明,肖湘蓉,等.基于中国剩余定理的数据库水印技术[J].计算机工程与应用,2006,42(7):135136.
|
[17] |
苑玮琦,黄静,桑海峰.小波分解与PCA方法的掌纹特征提取方法[J].计算机应用研究,2008,25(12):36713673.
|
[18] |
刘涛,杨风暴.主成分分析在图像压缩中的应用[J].哈尔滨师范大学自然科学学报,2008,24(4):6971.
|
[19] |
杨世元,吴德会,苏海涛.基于PCA和SVM的控制图失控模式智能识别方法[J].系统仿真学报,2006,18(5):13241328.
|