吉林大学学报(工学版) ›› 2017, Vol. 47 ›› Issue (1): 249-254.doi: 10.13229/j.cnki.jdxbgxb201701036
• Orginal Article • Previous Articles Next Articles
ZHAO Bo, QIN Gui-he
CLC Number:
[1] Lu C S, Liao H Y M. Multipurpose watermarking for image authentication and protection[J]. IEEE Transactions on Image Processing, 2001, 10(10): 1579-1592. [2] Maeno K,Sun Q,Chang S F,et al.New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization[J].IEEE Transactions on Multimedia,2006,8(1):32-45. [3] Lin C Y, Chang S F. A robust image authentication method distinguishing JPEG compression from malicious manipulation[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2001, 11(2): 153-168. [4] Ho C K, Li C T. Semi-fragile watermarking scheme for authentication of JPEG images[J].International Conference on Information Technology: Coding and Computing,2004,1(6): 7-11. [5] Ko C. A novel semi-fragile watermarking technique for image authentication[C]∥Proceedings of the Sixth IASTED International Conferenceon on (Signal and Image Processing),Marina Del Rey,2004. [6] Loukhaoukha K, Nabti M, Zebbiche K. A robust SVD-based image watermarking using a multi-objective particle swarm optimization[J]. Opto Electronics Review, 2014, 22(1):45-54. [7] Piva A, Bartolini F, Caldelli R. Self recovery authentication of images in the DWT domain[J]. International Journal of Image and Graphics, 2005, 5(01): 149-165. [8] 朱光, 师文, 朱学芳,等. 结合SURF特征的多功能彩色图像水印算法[J]. 中国图象图形学报, 2013, 18(12): 1694-1702. Zhu Guang,Shi Wen,Zhu Xue-fang,et al. Multi-purpose watermark algorithm of color images based on SURF[J]. Journal of Image and Graphics,2013,18(12):1694-1702. [9] 王友卫, 刘元宁, 朱晓冬. 用于图像内容认证的半脆弱水印新算法[J]. 浙江大学学报:工学版, 2013, 6(6):969-976. Wang You-wei,Liu Yuan-ning,Zhu Xiao-dong. Novel semi-fragile watermarking algorithm for image content authentication[J]. Journal of Zhejiang University(Engineering Science), 2013, 6(6):969-976. [10] Preda R O. Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain[J]. Measurement, 2013, 46(1): 367-373. [11] Michison G. The organization of sequential memory: sparse representation and the targeting problem[R]. In:Seelen W V,Shaw G.1einbos U M.Organization of Neural Networks. VCH Verlagsgesellsehaft, Weinheim,1988:347-367. [12] 赵宏伟, 陈霄, 刘萍萍,等. 视觉显著目标的自适应分割[J]. 光学精密工程, 2013,21(2):531-538. Zhao Hong-wei,Chen Xiao,Liu Ping-ping et al.Adaptive segmentation for visual salient object[J].Optics and Precision Engineering,2013,21(2):531-538. [13] Monga V, Mihcak K M. Robust and secure image hashing via non-negative matrix Factorizations[J]. IEEE Trans on Information Forensics and Security,2007,2(3):376-390. [14] 易开祥, 孙鑫, 石教英. 一种基于混沌序列的图像加密算法[J]. 计算机辅助设计与图形学学报,2000,12:672-676. Yi Kai-xiang, Sun Xin,Shi Jiao-ying. An image encryption arithmetic based on chaotic sequences[J]. Journal of Computer Aided Design and Computer Graphics,2000,12:672-676. [15] 刘瑞祯, 谭铁牛. 基于奇异值分解的数字图像水印方法[J]. 电子学报, 2001, 29(2):168-171. Liu Rui-zhen, Tan Tie-niu. SVD based digital watermarking method[J]. Acta Electronica Sinica, 2001, 29(2): 168-171. [16] Amit K S, Mayank D, Anand M. Hybrid technique for robust and imperceptible image watermarking in DWT-DCT-SVD domain[J]. National Academy Science Letters 2014, 37(4): 351-358. [17] Singh A, Tayal A, Choice of wavelet from wavelet families for DWT-DCT-SVD image watermarking[J]. International Journal of Computer Applications,2012, 48(17):9-14. [18] Qi X, Xin X. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization[J]. Journal of Visual Communication & Image Representation, 2015, 30: 312-327. [19] Qi X, Xin X. A quantization-based semi-fragile watermarking scheme for image content authentication[J]. Journal of Visual Communication & Image Representation, 2011, 22(2):187-200. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|