共 11 条
[1]
Bianchi T., 2009, EURASIP J. Inf. Security, DOI DOI 10.1155/2009/716357
[3]
Cheraghi A, 2014, INT J NONLINEAR ANAL, V5, P60
[5]
Mohammadi M., 2013, Iranian Conference on Electrical Engineering (ICEE), P1, DOI DOI 10.1109/PESMG.2013.6672514
[6]
Mohanty M., 2012, Proceedings of the 20th ACM international conference on Multimedia, P1105
[7]
Peijia Zheng, 2013, Information Hiding. 14th International Conference, IH 2012 Revised Selected Papers, P240, DOI 10.1007/978-3-642-36373-3_16
[8]
SaghaianNejadEsfahani SM, 2012, IEEE IMAGE PROC, P253, DOI 10.1109/ICIP.2012.6466843