Author:
Han Jialing,Zhao Xiaohui,Qiu Chunyan
Funder
Science Technology Research Foundation of Jilin Provincial Education Department
Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Botta M, Cavagnino D, Pomponiu V (2014) Fragile watermarking using Karhunen–Loeve transform: the KTL-F approach. Soft Comput. doi:10.1007/s00500-014-1373-y
2. Castiglione A, Pizzolante R, De Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst 1(43):120–134
3. Catuogno L, Galdi C (2014) On user authentication by means of video events recognition. J Ambient Intell Humaniz Comput 5(6):909–918
4. Chen Y, Peng L (2009) Optimal image watermark using genetic algorithm and synergetic neural network. In: Second international conference on intelligent computation technology and automation, vol 3, pp 209–212
5. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermaking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献