共 93 条
- [1] Chen XY(2017)Coverless information hiding method based on the Chinese character encoding J. Inter. Technol. 18 313-320
- [2] Chen S(2014)Steganalysis of least significant bit matching using multi-order differences Secur. Commun. Netw. 7 1283-1291
- [3] Wu YL(2016)Effective and efficient image copy detection with resistance to arbitrary rotation IEICE Trans. Inform. Syst. E99–D 1531-1540
- [4] Xia ZH(2016)A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing IEEE Trans. Inf. Forensics Secur. 11 2594-2608
- [5] Wang XH(2010)A flexible representation of quantum images for polynomial preparation, image compression and processing operations Quant. Inf. Process. 10 63-84
- [6] Sun XM(2014)Quantum Computation-Based Image Representation. Processing Operations and Their Applications Entropy 16 5290-5338
- [7] Wang BW(2017)Quantum image processing: a review of advances in its security technologies Int. J. Quant. Inform. 15 1730001-35
- [8] Zhou ZL(2016)A survey of quantum image representations Quant. Inf. Process. 15 1-149
- [9] Yang CN(2017)Quantum image processing Quant. Inf. Process. 16 27-149
- [10] Chen BJ(2014)Multi-channel information operations on quantum images Adv. Comput. Intell. Intell. Inf. 18 140-513