[1] SHEN ChangXiang, ZHANG HuangGuo, FENG DengGuo, CAO ZhenFu, HUANG JiWu. Survey of information security [J]. 中国科学F辑(英文版) 2007. [2] 黄继武, Yun Q.SHI, 程卫东, HUANG Ji-wu, Yun Q.SHI, CHENG Wei-dong. DCT域图像水印:嵌入对策和算法 [J]. 电子学报 2000.doi:10.3321/j.issn:0372-2112.2000.04.016 [3] 武拴虎, 谈正, Wu Shuanhu, Tan Zheng. 基于混沌序列的视频图像数字水印隐藏与多分辨检测 [J]. 西安交通大学学报 2000.doi:10.3321/j.issn:0253-987X.2000.06.009 [4] Tong Ming, Hu Jia, Ji Hongbing. AN ADAPTIVE DIGITAL IMAGE WATERMARK ALGORITHM BASED ON GRAY-SCALE MORPHOLOGY [J]. 电子科学学刊(英文版) 2009.doi:10.1007/s11767-008-0100-1 [5] 孙锬锋, 温泉, 王树勋. 基于人类视觉的混沌阵列在图像上的水印算法 [J]. 电子学报 2003.doi:10.3321/j.issn:0372-2112.2003.01.037 [6] Du Juan, Yu Yinglin, Xie Shengli. A NEW IMAGE QUALITY ASSESSMENT BASED ON HVS [J]. 电子科学学刊(英文版) 2005. [7] M. M. Lychak. INTERVAL CHARACTERISTICS OF CHAOTIC SEQUENCES [J]. Cybernetics and systems analysis 2004, 5(5). [8] Marco Carli, Patrizio Campisi, Alessandro Neri. Perceptual aspects in data hiding [J]. Telecommunication systems: Modeling, Analysis, Design and Management 2006, 1/3(1/3). [9] Jayant N., Johnston J.. Signal compression based on models of human perception [J]. Proceedings of the IEEE 1993, 10(10). |