共 16 条
[3]
Chen Tao, P INT C INF INF BEIJ, V5, P78
[7]
Iwata M., 2010, 2010 International Symposium On Information Theory & Its Applications (ISITA 2010), P309, DOI 10.1109/ISITA.2010.5649171
[8]
Jin XM, 2009, PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, P1, DOI 10.1109/ITNG.2009.10
[10]
Dual watermark for image tamper detection and recovery
[J].
PATTERN RECOGNITION,
2008, 41 (11)
:3497-3506