共 43 条
[1]
Adelsbach Andre, 2007, Transactions on Data Hiding and Multimedia Security II. (Lecture Notes in Computer Science vol. 4499), P1
[2]
Adelsbach A, 2007, LECT NOTES COMPUT SC, V4437, P145
[3]
Alsalami M. A., 2003, SCH ENG TECHNOL
[4]
Anderson R, 1997, LECT NOTES COMPUT SC, V1267, P107
[5]
Atallah MJ, 2003, LECT NOTES COMPUT SC, V2578, P196
[6]
Lime: Data lineage in the malicious environment
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8743
:183-187
[10]
Cox I.J., 1997, International Conference on Image Processing (ICIP'97), P26