3Su Liyun,Ma Hong,Tang Shifu. Adaptive image digital watermarking with DCT and FCM[J] 2006,Wuhan University Journal of Natural Sciences(6):1657~1660
二级参考文献16
1杨福生.小波变换的工程分析与应用[M].北京:科学出版社,2000..
2毛用才 胡奇英.随机过程[M].西安:西安电子科技大学出版社,1999..
3[1]Cox I J, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia[J ]. IEEE Trans. on Image Processing, 1997, 6(12): 1673 - 1687.
4[2]Cox, Miller M L. A review of watermarking and the importance of perceptual modeling[J]. Proc. SPIE Conf. on Human Vision and Electronic Imaging, 1997, 3016: 92- 99.
5[4]Piva A, Barni M, Bartolini F, et al. DCT-based watermark recovering without resorting to the uncorrupted original image[A]. Proceedings of 4th IEEE International Conference on Image Processing ICIP' 97[C]. Santa Barbara, CA, USA:ICIP, 1997. 520-523.
6Bezdek J C.Pattern Recognition with Fuzzy Objective Function Algorithms,1981.
7Cox I J;Kilian J;Leighton F T.Secure Spread Spectrum Watermarking for Multimedia[J],1997(12).
8Chang C H;Zhi Y;Zhang M Y.Fuzzy-ART Based Adaptive Digital Watermarking Scheme[J],2005(01).
9Chan P W;Michael R L;Chin R T.A Novel Scheme for Hybrid Digital Video Watermarking:Approach,Evaluation and Experimentation[J],2005(12).
10Tan S H;Ngan K N.Classified Perceptual Coding with Adaptive Quantization[J],1996(06).
6Puhan N B, Ho A T S. Binary Document Image Watermarking for Secure Authentication Using Perceptual Modeling [ C ]. In : Proceedings of the 5th IEEE International Symposium on Signal Processing and Information Technology, Athens Greece, IEEE Press, 2005: 393 - 398.
7Voyatzis G, Pitas I. The Use of Watermarks in the Protection of Digital Multimedia Products [ J ]. Proceedings of the IEEE, 1999, 87 (7): 1197-1207.