Author:
Tong Ming,Guo Jinyu,Tao Shichang,Wu Yangcheng
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference21 articles.
1. Cai D, He X, Han J, Huang T (2011) Graph regularized nonnegative matrix factorization for data representation. IEEE Trans Pattern Anal Mach Intell 33(8):1548–1560
2. Chen S, Leung H (2008) Chaotic watermarking for video authentication in surveillance applications. IEEE Trans Circuits Syst Video Technol 18(5):704–709
3. El-Fouly T, El-Saadany E, Salama M (2007) Improved grey predictor rolling models for wind power prediction. IET Gener Transm Distrib 1(6):928–937
4. Hassan A, Ayoub A-H, Hasan Y, Wahab M, Michaelis B (2009) Secure block-based video authentication with localization and self-recovery. World Acad Sci Eng Technol 57:69–74
5. He H, Chen F, Tai H-M, Kalker T, Zhang J (2012) Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme. IEEE Trans Inf Forensics Secur 7(1):185–196
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献