购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[1]MA Q, XING L, WU B.Technique for authenticating scalable video coding streams with bandwidth awareness [J].ICIC Express Letters Part B: Applications, 2015, 6(11):3121-3126.

[2]MA Q, XING L, WU B.A semantic watermarking technique for authenticating video of H.264 [J].Applied Mechanics and Materials, 2013, 1197-1200.

[3]XING L, MA Q, ZHU M.Tensor semantic model for an audio classification system [J].Science China-Information Sciences, 2013, 56 (6):1-9.

[4]XING L, MA Q, FU R, et al.A secure semantic transmission method for digital image based on UCL[C]//2012 International Conference on Measurement, Information and Control, 2012, 813-816.

[5]XING L, MA Q, WU H, et al.General multimedia trust authentication framework for 5G networks [J].Wireless Communications&Mobile Computing, 2018:1-9.

[6]LI Y, LU Z, ZHU C.Robust image hashing based on random Gabor filtering and dithered Lattice vector quantization [J].IEEE Transactions on Image Processing, 2012, 21 (4):1963-1980.

[7]QIN C, CHANG C C, TSOU P L.Robust image hashing using non-uniform sampling in discrete Fourier domain [J].Digital Signal Processing, 2013, 23 (2):578-585. 8RbfVjYtkbrqhUK/2z0K13UHA5bkvz2YDMBv17lXDVbk4glVXvw5tE+F+dGDG2xQ

点击中间区域
呼出菜单
上一章
目录
下一章
×