4VERMA J, KHEMCHANDANI V. A visual cryptographic tech- nique to secure image shares [J]. International Journal of Engineer- ing Research and Applications,2012,2(1 ) : 1121-1 125.
5TY S H, HSU C S. A joint ownership protection scheme for digital images based on visual cryptography[J]. The International Arab Journal of Information Technology, 2012,9 (3) : 276-283.
4Marco L. The Improbability of Harris Interest Points[J]. IEEE Trans. on Pattern Analysis and Machine Intelligence, 2010, 32(6): 1141-1147.
5Wang Xiangyang, Yang Yiping, Yang Hongying. Invariant Image Watermarking Using Multi-scale Harris Detector and Wavelet Moments[J]. Computers and Electrical Engineering, 2010, 36(1):31-44.
6Kutter M, Bhattacharjee S K, Ebrahimi T. Towards Second Gene- ration Watermarking Schemes[C]//Proc. of the 6th Int'l Conf. onImage Processing. Kobe, Japan: [s. n.], 1999.
7Harris C, Stephen M. A Combined Comer and Edge Detector[M]. Manchester, UK: [s. n.], 1988.