[1]ZHANG T, MU D J, REN S. Information Hiding (IH) algorithm based on Gaussian pyramid and GHM (Geronimo Hardin Massopust) multi-wavelet transformation [J]. International Journal of Digital Content Technology and Its Applications, 2011, 5(3): 210-218.
[2]ZENG F, ZHOU A. Image zero watermarking algorithm based on Contourlet transform and singular value decomposition[J]. Journal of Computer Applications, 2008, 28(8): 2033-2035.( 曾凡娟,周安民. 基于Contourlet变换和奇异值分解的图像零水印算法[J].计算机应用, 2008,28(8): 2033-2035.)
[3]LI X, YU D, CHENG L. Zero-watermark algorithm based on SVD[J]. Computer Engineering, 2009, 35(11): 163-165.( 李学斌,俞登峰,程亮. 基于奇异值分解的零水印算法[J]. 计算机工程, 2009, 35(11):163-165.)
[4]LI J,YE Y,HAN M. Improved watermarking algorithm for digital images robust to geometric distortion[J]. Computer Science, 2010, 37(2): 126-130.( 李健,叶有培,韩牟. 一种改进的抗几何攻击的数字图像水印算法[J]. 计算机科学,2010, 37(2):126-130.)
[5]XUE S,CHEN X. Digital image watermarking algorithm based on chaos encryption and SVD[J]. Computer Engineering, 2012, 38(19): 107-110.(薛胜男,陈秀宏. 基于混沌加密和 SVD 的数字图像水印算法[J]. 计算机工程, 2012, 38(19):107-110.)
[6]ZHANG H,YAO X, CHEN H, et al. Research of information hiding algorithm based on bit-plane and HVS[J]. Journal of Image and Graphics, 2013, 18(12): 1559-1566.( 张海涛,姚雪,陈虹宇,等. 基于位平面和HVS的信息隐藏算法[J]. 中国图象图形学报,2013,18(12):1559-1566.)
[7]TIAN H,YANG S. Color image retrieval algorithm based on significant bit-planes[J]. Journal of Computer-Aided Design and Computer Graphics, 2010, 22(2): 279-285.(田宏,杨树刚. 基于重要位平面的真彩色图像检索算法[J]. 计算机辅助设计与图形学学报,2010,22(2):279-285.)
[8]ZHAO C, LIU W. Mutual support dual watermark algorithm based on compressive sensing [J]. Acta Electronica Sinica, 2012, 40(4): 681- 687.( 赵春晖,刘巍. 基于压缩感知的交互支持双水印算法[J].电子学报, 2012, 40(4):681-687.)
[9]DUAN W,LI B.New digital image scrambling algorithm based on chaos and its parameters optimization[J].Application Research of Computers,2011,28(1):329-331.(段文文,李碧.基于混沌的数字图像置乱算法及参数优化[J].计算机应用研究,2011,28(1):329-331.)
[10]HUANG Z, MA Z. Statistical analysis of multiwavelet image transform [J]. Journal of Image and Graphics, 2001,6(12):1198-1203. (黄卓君,马争鸣.多小波变换的统计分析[J].中国图象图形学报,2001,6(12):1198-1203.)
[11]ZHAO R, WANG Q, WEN H. Design of AES algorithm based on two dimensional logistic and Chebyshev chaotic mapping[J]. Microcomputer Information, 2008, 24(3): 43-45.( 赵芮,王庆生,温会平.基于二维Logistic与Chebyshev映射的AES混沌加密算法[J]. 微计算机信息, 2008, 24(3): 43-45.)
[12]WANG L, LI Y. A stream cipher algorithm based on composite chaotic dynamical systems[J]. Journal of Dalian University of Technology, 2012,52(5):731-735. (王丽燕,李永华.一种基于复合混沌动力系统的序列密码算法[J].大连理工学报,2012,52(5):731-735.)
[13]WU X, ZHU P. On finite-product properties of two kinds of chaotic mappings[J]. Pure and Applied Mathematics, 2011,27(1):129-137. (吴新星,朱培勇. 关于两种混沌映射的有限乘积性质[J]. 纯粹数学与应用数学,2011,27(1):129-137.)
[14]WANG C-C, TAI S-C, YU C-Y. Repeating image watermarking technique by the visual cryptography[J]. IEICE Transactions on Fundamentals, 2000, 36(13): 1108-1110. |