Computer Science ›› 2013, Vol. 40 ›› Issue (8): 282-284.
Previous Articles Next Articles
CUI Zhuang,LV Jun-bai and FENG Tao
[1] Chamlawi R,Khan A,Usman I.Authentication and recovery ofimage using multiple watermarks[J].Computers and Electical Engineering,2010,36(3):578-584 [2] Fridrich J,Goljan M.Protection of digital images using self-embedding[A]∥Proceeding of NJIT Symposium on Content Security and Data Hiding in Digital Media[C].New Jersey Institute of Technology,May 1999 (下转第288页)(上接第284页) [3] 张鸿宾,杨成.图像的自嵌入及篡改的检测和恢复算法[J].电子学报,2004,2(2):196-199 [4] 张弘,王颖.基于哈希函数的小波域脆弱水印算法[J].中国科学院研究生院学报,2008,5(1):86-92 [5] 肖磊.一种具有高攻击类型判别能力的图像空域半脆弱水印算法[J].计算机科学,2010,7(2):286-289 [6] Selesnick I,Li K Y.Video denoising using 2D and 3D dual-tree complex wavelet transforms[C]∥Proceedings of the SPIE 5207(Wavelets Applications in Signal and Image Processing X).2003:607-618 [7] Selesnick I W,Baraniuk R G,Kingsbury N G.The dual-treecomplex wavelet transform[J].IEEE Signal Process.Mag., 2005,22:123-151 [8] Sai N S T,Patil R C.Image Retrival using 2D Dual-tree Discrete Wavelet Transform.Internation[J].Journal of Computer Applications,2011,14(6) [9] 基于自适应编码次序的多级树集合分裂算法[J].计算机应用,2012,2(3):732-735 [10] Yang Jing-yu,Wang Yao,Xu Wen-li,et al.Image Coding Using Dual-tree Discrete Wavelet Transform[J].IEEE Transactions on Image Processing,2008,17(9):1555-1569 [11] Kingsbury N G,Reeves T.Redundant representation with complex wavelets:how to achieve sparsity[C]∥International Conference on Image Processing.September 2003:45-48 |
No related articles found! |
|