Citation: | HE Hongjie, CHEN Fan, YIN Zhongke. A New Secure Digital Camera Model Based on State Parameter[J]. Journal of Southwest Jiaotong University, 2013, 26(3): 460-466. doi: 10.3969/j.issn.0258-2724.2013.03.011 |
BIANCHI T, PIVA A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2): 87-96.
|
LUO Weiqi, QU Zhenhua, PAN Feng, et al. A survey of passive technology for digital image forensics[J]. Frontiers of Computer Science in China, 2007, 1(2): 166-179.
|
BLYTHE P, FRIDRICH J. Secure digital camera[C]//Digital Forensic Research Workshop. Baltimore: [s.n.], 2004: 11-13.
|
KORUS P, DZIECH A. Efficient method for content [JP3]reconstruction with self-embedding[J]. IEEE Transactions on Image Processing, 2013, 22(3): 1134-1147.
|
HE Hongjie, CHEN Fan, TAI H M, et al. Performance analysis of a block-neighborhood-based self-recovery fragile watermarking scheme[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1): 185-196.
|
ZHANG Xinpeng, WANG Shuozhong, QIAN Zhenxing, et al. Reference sharing mechanism for watermark self-embedding[J]. IEEE Transactions on Image Processing, 2011, 20(2): 485-495.
|
陈帆,和红杰,王宏霞. 用于图像认证的变容量恢复水印算法[J]. 计算机学报,2012,35(1): 154-162.CHEN Fan, HE Hongjie, WANG Hongxia. Variable-payload self-recovery watermarking scheme for digital image authentication[J]. Chinese Journal of Computers, 2012, 35(1): 154-162.
|
MOHANTY S P. A secure digital camera architecture for integrate real-time digital rights management [J]. Journal of Systems Architecture, 2009, 55: 468-480.
|
HIEW B Y, TEOH A B, YIN O S. A secure digital camera based fingerprint verification system[J]. Journal of Visual Communication and Image Representation, 2010, 21: 219-231.
|
田新,刘曼,杨祥辉. 一种带有水印嵌入功能的数码相机: 中国,200510003430[P]. 2007-07-04.
|
FRIDRICH J, GOLJAN M, MEMON N. Cryptanalysis [JP3]of the Yeung-Mintzer fragile watermarking technique[J]. Electronic Imaging, 2002, 11(4): 262-274.
|
冯登国. 密码分析学[M]. 北京:清华大学出版社,2000: 1-3.
|
余旺科,马文平,陈和风. 分簇无线传感器网络密钥管理方案[J]. 西南交通大学学报,2011,46(2): 310-314.YU Wangke, MA Wenping, CHEN Hefeng. Key management scheme for clustered wireless sensor networks[J]. Journal of Southwest Jiaotong University, 2011, 46(2): 310-314.
|
LIAN Shiguo, SUN Jinsheng, WANG Jinwei, et al. A chaotic stream cipher and the usage in video protection[J]. Chaos Solitons & Fractals, 2007, 34: 851-859.
|
刘丽,王永庆. 视频哈希的安全性分析[J]. 西南交通大学学报,2012,47(4): 675-679.LIU Li, WANG Yongqing. Security of video hashing[J]. Journal of Southwest Jiaotong University, 2012, 47(4): 675-679.
|
魏贵民,周仲礼,许必才. 概率论与数理统计[M]. 北京:高等教育出版社,2007: 26-31.
|
ZHANG Jiashu, WANG Xiaomin. Chaotic keyed hash function based on feedforward-feedback nonlinear digital filter[J]. Physics Letters A , 2007, 362(5/6): 439-448.
|
[1] | JIA Chaojun, CHEN Fanlei, LEI Mingfeng, HUANG Juan, SHI Chenghua, LIU Di. Determination Method of Rock Strength Based on Digital Drilling Parameters[J]. Journal of Southwest Jiaotong University. doi: 10.3969/j.issn.0258-2724.20230328 |
[2] | DING Guofu, HE Xu, ZHANG Haizhu, LI Rong, WANG Shuaihu. Application and Challenges of Digital Twin in Life Cycle of High-Speed Trains[J]. Journal of Southwest Jiaotong University, 2023, 58(1): 58-73. doi: 10.3969/j.issn.0258-2724.20210573 |
[3] | JIANG Haifan, DING Guofu, XIAO Tong, FAN Mengjie, FU Jianlin, ZHANG Jian. Digital Twin Evolution Model and Its Applications in Intelligent Manufacturing[J]. Journal of Southwest Jiaotong University, 2022, 57(6): 1386-1394. doi: 10.3969/j.issn.0258-2724.20210202 |
[4] | DUAN Wei, CAI Guojun, LIU Songyu. Evaluation Method of Maximum Shear Modulus of Cohesionless Soil Based on State Parameters from Piezocone Penteration Test[J]. Journal of Southwest Jiaotong University, 2019, 54(4): 801-807. doi: 10.3969/j.issn.0258-2724.20170432 |
[5] | YIN Bangxu, CHEN Fan, WEI Wei, WANG Hongxia. Self-Recovery E-evidence Image Watermarking Algorithm Based on Binary features of Important Blocks[J]. Journal of Southwest Jiaotong University, 2017, 30(1): 156-163,208. doi: 10.3969/j.issn.0258-2724.2017.01.022 |
[6] | LIU Yamin, HAN Sen, XU Ouming. Acquisition System for Three-Dimensional Surface Texture of Asphalt Pavement Based on Digital Image Processing[J]. Journal of Southwest Jiaotong University, 2014, 27(2): 351-357. doi: 10.3969/j.issn.0258-2724.2014.02.025 |
[7] | Chen-Wei-Rong, FENG Qian, ZHANG Jian, XU Guo-Wang, LI Zhe, . Image ObjectDetection inM onitoring ofPantograph Slippers[J]. Journal of Southwest Jiaotong University, 2010, 23(1): 59-64. doi: 10. 3969/.j issn. 0258-2724. 2 |
[8] | SONG Wei, HOU Jianjun, LI Zhaohong. Fragile Watermarking Algorithm Based on Circular Structure[J]. Journal of Southwest Jiaotong University, 2009, 22(5): 672-676. |
[9] | HE Mingzhi, XU Jianping, WU Songrong. Digital V2 Control of DC-DC Switching Converters Based on Leading-Edge Modulation[J]. Journal of Southwest Jiaotong University, 2007, 20(4): 484-489. |
[10] | ZHANG Zutao, ZHANG Jiashu, HE Hongjie. Safety of Facial Images Based on Fragile Digital Watermarking[J]. Journal of Southwest Jiaotong University, 2007, 20(3): 340-344. |
[11] | XIE Zhi-jiang, HAN Zhi-hua, XIAO Yi. Development of Digital Video Monitoring System for Steel-Making Process[J]. Journal of Southwest Jiaotong University, 2003, 16(5): 592-595. |
[12] | WANGJin-tao, LIUWen-yao, LUShuo. Application of Watershed Algorithm to Cell Image Segmentation[J]. Journal of Southwest Jiaotong University, 2002, 15(3): 290-294. |
[13] | HAO Yong-jie, LIUWen-yao, LUShuo. Spatial Correction of the Distorted License Plate Image of Automobiles[J]. Journal of Southwest Jiaotong University, 2002, 15(4): 417-420. |
[14] | YANG Tian-wu, LIU Rong, PENG Qiang. Real-Time Video Technologies for MS-Windows[J]. Journal of Southwest Jiaotong University, 2002, 15(2): 172-176. |