共 17 条
[1]
Bell T. C., 1990, TEXT COMPRESSION
[2]
Blahut R.E., 1987, Principles and Practice of Information Theory
[3]
Cover T. M., 2005, ELEM INF THEORY, DOI 10.1002/047174882X
[4]
Cox I. J., 2002, DIGITAL WATERMARKING
[6]
CSISZAR I, 1981, INFORMATION THEORY C
[7]
Ettinger JM, 1998, LECT NOTES COMPUT SC, V1525, P319
[8]
Garey M. R., 1979, Computers and intractability. A guide to the theory of NP-completeness
[9]
Hopper NJ, 2002, LECT NOTES COMPUT SC, V2442, P77
[10]
Securing symmetric watermarking schemes against protocol attacks
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV,
2002, 4675
:260-268