共 35 条
[21]
Meerwald P, 2001, QUANTIZATION WATERMA
[22]
Muller, 2006, JPEG2000 BASED SECUR
[24]
Oriyano Sean-Philip, 2010, INT J COMPUT APPL, V1, P73
[25]
Poornima R., 2013, International Journal of Computer Science & Engineering Survey, V4, P23, DOI 10.5121/ijcses.2013.4102
[26]
Prasad, 2018, SAUDI J BUSINESS MAN
[27]
The state of cryptographic hash functions
[J].
LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE,
1999, 1561
:158-182
[28]
Rekik Siwar., 2012, International Journal of Computer Science and Security, V6, P79
[30]
Schneider M, 1996, INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, P227, DOI 10.1109/ICIP.1996.560425