[1]
|
Zhao Chun-Hui, Liu Wei. Block compressive sensing based image semi-fragile zero-watermarking algorithm. Acta Automatica Sinica, 2012, 38(4): 609-617(赵春晖, 刘巍. 基于分块压缩感知的图像半脆弱零水印算法. 自动化学报, 2012, 38(4): 609-617)
|
[2]
|
Zhang Wei-Wei, Zhang Ru, Liu Jian-Yi, Niu Xin-Xin, Yang Yi-Xian. Robust video watermarking algorithm for H.264/AVC based on texture feature. Journal on Communications, 2012, 33(3): 82-89(张维纬, 张茹, 刘建毅, 钮心忻, 杨义先. 基于纹理特征的H.264/AVC顽健视频水印算法. 通信学报, 2012, 33(3): 82-89)
|
[3]
|
Wang Jun-Xiang, Ni Jiang-Qun, Pan Jin-Wei. A high performance reversible watermarking scheme baselineskip based on histogram shifting. Acta Automatica Sinica, 2012, 38(1): 88-96(王俊祥, 倪江群, 潘金伟. 一种基于直方图平移的高性能可逆水印算法. 自动化学报, 2012, 38(1): 88-96)
|
[4]
|
Li Xu-Dong. JPEG-compression-attack resistant image quantization watermarking algorithm in DWT domain. Journal of Optoelectronics·Laser, 2012, 23(2): 342-348(李旭东. 抗JPEG压缩攻击的DWT域图像量化水印算法. 光电子. 激光, 2012, 23(2): 342-348)
|
[5]
|
Zhu Bing-Lian, Liang Hui, Yang Ji-Xiang. A text document digital watermarking algorithm based on fuzzy clustering theory. Journal of Optoelectronics·Laser, 2012, 23(2): 349-353(朱冰莲, 梁辉, 杨吉祥. 一种基于模糊聚类理论的文本水印算法. 光电子. 激光, 2012, 23(2): 349-353)
|
[6]
|
Chen Fan, He Hong-Jie, Wang Hong-Xia. Variable-payload self-recovery watermarking scheme for digital image authentication. Chinese Journal of Computers, 2012, 35(1): 154-162(陈帆, 和红杰, 王宏霞. 用于图像认证的变容量恢复水印算法. 计算机学报, 2012, 35(1): 154-162)
|
[7]
|
Cui Xin-Chun, He Jie, Qin Xiao-Lin. A multiple audio watermarking for database based on blind source separation. Acta Electronica Sinica, 2012, 40(1): 78-83(崔新春, 贺洁, 秦小麟. 基于盲源分离的多重音频数据库水印算法. 电子学报, 2012, 40(1): 78-83)
|
[8]
|
Jiang Chuan-Xian, Chen Xiao-Wei, Li Zhi. Robust text watermarking based on significant components. Acta Automatica Sinica, 2012, 36(9): 1250-1256(姜传贤, 陈孝威, 李智. 基于文本重要内容的鲁棒水印算法. 自动化学报, 2010, 36(9): 1250-1256)
|
[9]
|
Deng Cheng, Li Jie, Gao Xin-Bo. Geometric attacks resistant image watermarking in affine covariant regions. Acta Automatica Sinica, 2010, 36(2): 221-228(邓成, 李洁, 高新波. 基于仿射协变区域的抗几何攻击图像水印算法. 自动化学报, 2010, 36(2): 221-228)
|
[10]
|
Bors A G. Watermarking mesh-based representations of 3-D objects using local moments. IEEE Transactions on Image Processing, 2006, 15(3): 687-701
|
[11]
|
Hu Min, Xie Ying, Xu Liang-Feng, Xue Feng. A geometry property based adaptive watermarking scheme for 3D models. Journal of Computer-Aided Design and Computer Graphics, 2008, 20(3): 390-394, 402(胡敏, 谢颖, 许良凤, 薛锋. 基于几何特征的自适应三维模型数字水印算法. 计算机辅助设计与图形学学报, 2008, 20(3): 390-394, 402)
|
[12]
|
Liao Xue-Liang, Wang Yu-Ping. A new spatial domain method for watermarking in 3D models. Chinese Journal of Computers, 2008, 31(10): 1848-1856(廖学良, 王瑀屏. 一种新的三维模型水印嵌入空域算法. 计算机学报, 2008, 31(10): 1848-1856)
|
[13]
|
Wang Xin-Yu, Zhan Yong-Zhao. Blind watermarking scheme for 3D mesh models based on length of vector. Journal of Jiangsu University (Natural Science Edition), 2008, 29(3): 248-251(王新宇, 詹永照. 基于矢量长度的三维网格模型公有水印算法. 江苏大学学报(自然科学版), 2008, 29(3): 248-251)
|
[14]
|
Quan L, Liu Y. Watermarking of 3D polygonal meshes based on feature points. In: Proceedings of the 2nd IEEE Conference on Industrial Electronics and Application. Harbin, China: IEEE, 2007. 1837-1841
|
[15]
|
Jin J Q, Wang X. A novel 3D mesh blind watermarking algorithm based on nielson affine invariant norm. In: Proceedings of the 10th IEEE International Conference on Computer-aided Design and Computer Graphics. Beijing, China: IEEE, 2007. 294-297
|
[16]
|
Cho J W, Prost R, Jung H Y. An oblivious watermarking for 3-D polygonal meshes using distribution of vertex norms. IEEE Transactions on Signal Processing, 2007, 55(1): 142-155
|
[17]
|
Lee S H, Kwon K R. Mesh watermarking based projection onto two convex sets. Multimedia Systems, 2008, 13(5-6): 323-330
|
[18]
|
Corsini M, Gelasca E D, Ebrahimi T, Barni B. Watermarked 3-D mesh quality assessment. IEEE Transactions on Multimedia, 2007, 9(2): 247-256
|
[19]
|
Cheng Y M, Wang C M. An adaptive steganographic algorithm for 3D polygonal meshes. Visual Computer, 2007, 23(9): 721-732
|
[20]
|
Liu Y, Prabhakaran B, Guo X H. A robust spectral approach for blind watermarking of manifold surfaces. In: Proceedings of the 10th ACM Workshop on Multimedia and Security. New York, USA: ACM, 2008. 43-52
|
[21]
|
Wang K, Luo M, Bors A G, Denis F. Blind and robust mesh watermarking using manifold harmonics. In: Proceedings of the 16th IEEE International Conference on Image. Piscataway: IEEE, 2009. 3657-3660
|
[22]
|
Ji Feng, Li Zhan-Li. A novel method for the topological reconstruction based on STL files. Journal of Hunan University of Science and Engineering, 2006, 27(5): 154-157(纪峰, 李占利. 基于STL文件的拓扑重构新方法. 湖南科技学院学报, 2006, 27(5): 154-157)
|
[23]
|
Kalivas A, Tefas A, Pitas I. Watermarking of 3D models using principal component analysis. In: Proceedings of the 2003 IEEE International Conference on Acoustics, Speech, and Signal (ICASSP'03). New York: IEEE, 2003. 676-679
|
[24]
|
Berchtold S, Bohm C, Kriegel H P. The pyramid-technique: towards breaking the curse of dimensionality. In: Proceedings of the 1998 International Conference on Management of Data. New York: ACM Press, 1998. 142-153
|
[25]
|
Zhang R, Ooi B C, Tan B C. Making the pyramid technique robust to query types and workloads. In: Proceedings of the 20th International Conference on Data Engineering. New York: IEEE, 2004. 313-324
|
[26]
|
Liu J X, Cui H G, Dai X. Three dimensional point clouds watermarking algorithm based on sphere degenerated octree. Advanced Materials Research, 2011, 314-316: 2064-2070
|
[27]
|
Zhuang Yi, Hu Hai-Yang, Hu Hua. Centroid-slice-based uncertain high-dimensional indexing structure. Acta Electronica Sinica, 2011, 39(5): 1136-1142(庄毅, 胡海洋, 胡华. 基于质心片的不确定高维索引研究. 电子学报, 2011, 39(5): 1136-1142)
|
[28]
|
Meng Xian-Fu, Meng Hong-Xi, Zhang Zhen-Qiang. Bit-code and distance-based range query for high-dimensional data in Chord network. Journal of Dalian University of Technology, 2011, 51(3): 433-439(孟宪福, 孟泓汐, 张振强. 基于区位码和距离的Chord网络高维数据范围检索. 大连理工大学学报, 2011, 51(3): 433-439)
|
[29]
|
Melax S. A simple fast and effective polygon reduction algorithm. Game Developer, 1998, 5(11): 44-49
|