



[1]MA Q, XING L, WU B.Technique for authenticating scalable video coding streams with bandwidth awareness [J].ICIC Express Letters Part B: Applications, 2015, 6(11):3121-3126.
[2]MA Q, XING L, WU B.A semantic watermarking technique for authenticating video of H.264 [J].Applied Mechanics and Materials, 2013, 1197-1200.
[3]XING L, MA Q, ZHU M.Tensor semantic model for an audio classification system [J].Science China-Information Sciences, 2013, 56 (6):1-9.
[4]XING L, MA Q, FU R, et al.A secure semantic transmission method for digital image based on UCL[C]//2012 International Conference on Measurement, Information and Control, 2012, 813-816.
[5]XING L, MA Q, WU H, et al.General multimedia trust authentication framework for 5G networks [J].Wireless Communications&Mobile Computing, 2018:1-9.
[6]LI Y, LU Z, ZHU C.Robust image hashing based on random Gabor filtering and dithered Lattice vector quantization [J].IEEE Transactions on Image Processing, 2012, 21 (4):1963-1980.
[7]QIN C, CHANG C C, TSOU P L.Robust image hashing using non-uniform sampling in discrete Fourier domain [J].Digital Signal Processing, 2013, 23 (2):578-585.