Kutter Martin, Voloshynovskiy Sviatoslav, Herrigel Alexander.The watermark copy attack. Proc. of the SPIE, Security and Watermarking of Multimedia Contents Ⅱ, San Jose, CA, 2000,3971:371 - 380.[2]Barr John, Bradley Brett, Hannigan Brett T. Using digital watermarks with image signatures to mitigate the threat of the copy attack. ICASSP03, 2003 IEEE International Conference,Hong Kong, 2003, 3:69 - 72.[3]CoxIngemar J,Miller Matthew L,Bloom Jeffrey A著.王颖,黄志蓓译.数字水印.北京:电子工业出版社,2003:第9章.[4]Turk M, Pentland A. Eigenfaces for recognition[J].Journal of Cognitive Neuroscience.1991, 3(1):71-[5]Yu Dan, Sattar Farook, Ma Kai-Kuang. Watermark detection and extraction using independent component analysis method. EURASIP Journal on Applied Signal Processing, 2002, 1: 92 -104.[6]Shen Minfen, Zhang Xinjung, Sun Lisha, Beadle P J, Chan FHY.A method for digital image watermarking using ICA. ICA 2003,Nara, Japan, 2003:209 -214.[7]Liu Ju, Nie Kaibao, He Zhenya. Blind separation by redundancy reduction in a recurrent neural network. Chinese Journal of Electronics, 2001, 10(3): 415 -419.[8]He Zhenya, Liu Ju, Yang Luxi. Blind separation of images using Edgeworth expansion based ICA algorithm. Chinese Journal of Electronics, 1999, 8(3): 278 -282.[9]周亚训,叶庆卫,徐铁峰.基于小波和余弦变换组合的图像水印方案.电子学报,2001,29(12):1693-1695.
|