吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 1447-1452.doi: 10.7964/jdxbgxb201405036
Previous Articles Next Articles
WEN Quan1,WANG Yu-fei2,ZHANG Xin-peng3
CLC Number:
[1] Lei Lei Win, Thomas Tony, Emmanuel Sabu. Privacy enabled digital rights management without trusted third party assumption[J]. IEEE Transactions Multimedia, 2012, 14(5):546-554. [2] Qing Si-han. Twenty years development of security protocols research[J]. Journal of Software, 2003, 14(10):1740-1752. [3] Qiao L, Nahrstedt K. Watermarking scheme and protocols for protecting rightful ownership and customer's rights[J]. J Vis Commun, Image Representation, 1998, 9(9):194-210. [4] Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Trans Image Process, 2001,10(4):643-649. [5] Lei Chin-Laung, Yu Pei-Ling, Tsai Pan-lung, et al. An efficient and anonymous buyer-seller watermarking protocol[J]. IEEE Transaction on Image Processing,2004,13(12): 1618-1626. [6] Frattolillo Franco. Watermarking protocol for web context[J]. IEEE Transaction on Information Forensics and Security, 2007, 2(3):350-363. [7] Chen Tzung-Her, Horng Gwoboa. A lightweight and anonymous copyright-protection protocol[J]. Computer Standards & Interface, 2007,29(2):229-237. [8] Deng M, Bianchi T, Piva A, et al. An efficient buyer-seller watermarking protocol based on composite signal representation[C]∥Proc 11th ACM Workshop on Multimedia and Security, Princeton, NJ, New York, ACM, 2009:9-18. [9] Rial Alfredo. A privacy-preserving buyer-seller watermarking protocol based on priced oblivious transfer[J]. IEEE Transaction on Information Forensics and Security, 2011, 6(1):202-212. [10] Katzenbeisser Stefan, Lemma Aweke, Celik Mehmet,et al. A buyer-seller watermarking protocol based on secure embedding[J]. IEEE Transaction on Information Forensics and Security, 2008, 3(4):783-786. [11] Zhang Xin-peng. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters,2011,18(4):255-258. [12] Zhang Xin-peng. Separable reversible data hiding in encrypted image[J]. IEEE Transaction on Information Forensics and Security,2012,7(2):826-832. [13] Adelsbach A, Katzenbeisser S, Sadeghi A R. Watermark detection with zero-knowledge disclosure[J]. ACM Multimedia Systems Journal, 2003, 9(3):266-278. |
[1] | YING Huan,LIU Song-hua,TANG Bo-wen,HAN Li-fang,ZHOU Liang. Efficient deterministic replay technique based on adaptive release strategy [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1917-1924. |
[2] | LIU Zhong-min,WANG Yang,LI Zhan-ming,HU Wen-jin. Image segmentation algorithm based on SLIC and fast nearest neighbor region merging [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1931-1937. |
[3] | SHAN Ze-biao,LIU Xiao-song,SHI Hong-wei,WANG Chun-yang,SHI Yao-wu. DOA tracking algorithm using dynamic compressed sensing [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1938-1944. |
[4] | YAO Hai-yang, WANG Hai-yan, ZHANG Zhi-chen, SHEN Xiao-hong. Reverse-joint signal detection model with double Duffing oscillator [J]. 吉林大学学报(工学版), 2018, 48(4): 1282-1290. |
[5] | QUAN Wei, HAO Xiao-ming, SUN Ya-dong, BAI Bao-hua, WANG Yu-ting. Development of individual objective lens for head-mounted projective display based on optical system of actual human eye [J]. 吉林大学学报(工学版), 2018, 48(4): 1291-1297. |
[6] | CHEN Mian-shu, SU Yue, SANG Ai-jun, LI Pei-peng. Image classification methods based on space vector model [J]. 吉林大学学报(工学版), 2018, 48(3): 943-951. |
[7] | CHEN Tao, CUI Yue-han, GUO Li-min. Improved algorithm of multiple signal classification for single snapshot [J]. 吉林大学学报(工学版), 2018, 48(3): 952-956. |
[8] | MENG Guang-wei, LI Rong-jia, WANG Xin, ZHOU Li-ming, GU Shuai. Analysis of intensity factors of interface crack in piezoelectric bimaterials [J]. 吉林大学学报(工学版), 2018, 48(2): 500-506. |
[9] | LIN Jin-hua, WANG Yan-jie, SUN Hong-hai. Improved feature-adaptive subdivision for Catmull-Clark surface model [J]. 吉林大学学报(工学版), 2018, 48(2): 625-632. |
[10] | WANG Ke, LIU Fu, KANG Bing, HUO Tong-tong, ZHOU Qiu-zhan. Bionic hypocenter localization method inspired by sand scorpion in locating preys [J]. 吉林大学学报(工学版), 2018, 48(2): 633-639. |
[11] | YU Hua-nan, DU Yao, GUO Shu-xu. High-precision synchronous phasor measurement based on compressed sensing [J]. 吉林大学学报(工学版), 2018, 48(1): 312-318. |
[12] | WANG Fang-shi, WANG Jian, LI Bing, WANG Bo. Deep attribute learning based traffic sign detection [J]. 吉林大学学报(工学版), 2018, 48(1): 319-329. |
[13] | LIU Dong-liang, WANG Qiu-shuang. Instantaneous velocity extraction method on NGSLM data [J]. 吉林大学学报(工学版), 2018, 48(1): 330-335. |
[14] | TANG Kun, SHI Rong-hua. Detection of wireless sensor network failure area based on butterfly effect signal [J]. 吉林大学学报(工学版), 2017, 47(6): 1939-1948. |
[15] | LI Juan, MENG Ke-xin, LI Yue, LIU Hui-li. Seismic signal noise suppression based on similarity matched Wiener filtering [J]. 吉林大学学报(工学版), 2017, 47(6): 1964-1968. |
|