论文首页哲学论文经济论文法学论文教育论文文学论文历史论文理学论文工学论文医学论文管理论文艺术论文 |
中国网提供大量免费mba硕士,如有业务需求请咨询网站客服人员! 本文来自中国科教评价网
参考文献
[1] V.Monga,A.Banerjee,B.L.Evans,A Clustering Based Approach to Perceptual Image Hashing. IEEETransactions on Information forensics and security,2006,1(1):68-79
[2] V.Monga ,M.K.Mihcak, Robust and Secure Image Hashing via Non-Negative Matrix Factorizations. IEEETransactions on Information Forensics and Security,2007,2(3):376-390
[3] R. Venkatesan, S. M. Koon, M. H. Jakubowski, P. Moulin, Robust image hashing. IEEE Proc. InternationalConference on Image Processing,2000,3(10-13):664 - 666
[4] J. Fridrich ,M. Goljan, Robust Hash functions for Digital Watermarking. IEEE Proc. International Conferenceon Information Technology: Coding and Computing, 2000, (27-29):178-183
[5] M. K. Mihcak, R. Venkatesan, New Iterative Geometric Methods for Robust Perceptual Image Hashing. Proc.of ACM Workshop on Security and Privacy in Dig. Rights Mgmt, PA,2001:289-294
[6] HONG WANG, QIONG SUN.Research on Audio information hiding algorithm Based on BP Neural Network.Proceedings of International Conference on Wavelet Analysis and Pattern Recognition,Beijing,China,2007,(2-4):687-690