8Candy Schwartz. Digital Libraries : An Overview . The Journal of Academic Librarlanship, 2000 ; (26)6.
二级参考文献45
1秦苏宾.海拉尔2000年全国图书馆年会发言提纲:发展中的中国数字图书有限公司[M].,-..
2[1]F. Hartung, M. Kutter, Multimedia watermarking techniques, Proc. IEEE, 1999, 87(7), 1079-1107.
3[2]I.J. Cox, J. Kilian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1674-1687.
4[3]S. Craver, N. Memon B. Yeo, M. M. Yeung, Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks and implications, IEEE J. on Selected Areas in Communications, 1998, 16(4), 573-586.
5[4]W. Zeng, B. Liu, A statistical watermark detection technique without using original image for resolving rightful ownerships of digital images, IEEE Trans. on Image Processing, 1999, IP-8(11),1534-1548.
6[5]M.D. Swanson, B. Zhu, A. H. Tewfik, Multiresolution scene-based video watermarking using perceptual models, IEEE J. on Selected Areas in Communications, 1998, 16(4), 540-550.
7[6]Chiou-Ting Hsu, Ja-Ling Wu, Hiding digital watermarks in image, IEEE Trans. on Image Processing, 1999, IP-8(1), 58-68.
8[7]F.S.V. Bazan, Sensitivity eigenanalysis for single shift-invariant subspace-based method, Signal Processing, 2000, 80(1), 89-100.
9Frew, J. The Alexandria Digital Library Architecture. International Journal Digital Library. 2000(2)
10David Bawden and Ian Rowlands. Digital Libraries: Assumptions and Concepts. Libri, 1999 (19) :181-191