Authentication Technologies of X-ray Inspection Image for Container Terminal Automation
暂无分享,去创建一个
[1] Hae Yong Kim,et al. Secure authentication watermarking for binary images , 2003, 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI 2003).
[2] Ioannis Pitas,et al. Digital Image Processing Algorithms , 1993 .
[3] Jean-Francois Delaigle,et al. Invisibility and application functionalities in perceptual watermarking an overview , 2002, Proc. IEEE.
[4] Dong Hwa Kim. Optimal Learning of Neo-Fuzzy Structure Using Bacteria Foraging Optimization , 2005 .
[5] Anastasios Tefas,et al. Robust spatial image watermarking using progressive detection , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[6] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[7] Jae S. Lim,et al. Two-Dimensional Signal and Image Processing , 1989 .
[8] Sunggyu kwon. A Fuzzy BOXES Scheme for the Cartpole Control , 2005 .
[9] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[10] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[11] Paul J. Shlichta,et al. Higher-dimensional Hadamard matrices , 1979, IEEE Trans. Inf. Theory.