期刊文献+

市场冷对企业出书现象

下载PDF
导出
作者 李星星
出处 《出版参考》 2006年第06X期11-11,共1页 Publishing Reference
  • 相关文献

参考文献2

二级参考文献12

  • 1[1]Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding a survey[J]. Proceedings of the IEEE, 1999,87(7):1062~1078.
  • 2[2]Peticolas F A P, Anderson R J, Kuhn M G. Attacks on copyright marking system [ A ]. In: Second International Workshop on Information Hiding[C], Portland, Oregon. U.S.A., April 14-17, 1998, Published in: Lecture Notes in Computer Science[J], 1998,1525: 218~238.
  • 3[3]Cox I J, Miller M L. A review of watermarking and the importance of perceptual modeling [J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1987,3016: 92 ~ 99.
  • 4[4]Friedman G L. The trustworthy digital camera: restoring credibility to the photographic image [J]. IEEE Trans. on Consumer Electronics, 1993.39(10) :905~ 910.
  • 5[5]Kutter M, Bhattacharjee S K, Ebrahimi T. Towards second generation watermarking schemes [A]. In: Proceedings 6th International Conference on Image Processing (ICIP'99)[C],Kobe. Japan. October 24-28, 1999:320~323.
  • 6[6]Kundur Deepa. Hatzinakos Dimitrios. Digital watermarking for telltale tamper-proofing and authentication [J]. Proceedings of the IEEE: Special Issue on Identification and Protection of Multimedia Information, 1999,87(7) :1167~1180.
  • 7[7]Calderbank A R. Daubeehies I, Sweldens W et al. Wavelet ransforms that map integers to integers [J]. Applied and Computational Harmonics Analysis, 1998, (5) :332~369.
  • 8Voyatzis G, Pitas I. Application of toral automorphisms in image watermarking[J]. IEEE Int. Conf. on Image Processing,1996,2:237-240.
  • 9柏森,曹长修.图象置乱度研究[A].见:全国第三届信息隐藏学术研讨会论文集[C],西安:西安电子科技大学,2001:75~81.
  • 10吴旻升,王介生,刘慎权.图像的排列变换[J].计算机学报,1998,21(6):514-519. 被引量:64

共引文献47

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部