共 21 条
[1]
[Anonymous], P INT C IM PROC THES
[4]
Feng GR, 2004, IEICE T FUND ELECTR, VE87A, P949
[5]
Symmetric ciphers based on two-dimensional chaotic maps
[J].
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS,
1998, 8 (06)
:1259-1284
[7]
The watermark template attack
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III,
2001, 4314
:394-405
[8]
Inoue H, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 2, P391, DOI 10.1109/ICIP.1998.723388
[10]
ORuanaidh JJK, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P239, DOI 10.1109/ICIP.1996.560428