[1] |
HOLT L , MAUFE B G , WIENER A . Encoded marking of a recording signal[P]. U L Patent GB2196167A, 1988.
|
[2] |
HIMANSHU A , FAROOQ H . Development of payload capacity enhanced robust video watermarking scheme based on symmetry of circle using lifting wavelet transform and SURF[J]. Journal of Information Security and Applications, 2021,59.
|
[3] |
SHOHIDULISLAM M , NAQVI N , ABBASI A T ,et al. Robust dual domain twofold encrypted image-in-audio watermarking based on SVD[J]. Circuits,Systems,and Signal Processing, 2021 (prepublish).
|
[4] |
赵春雨 . 提高嵌入容量的水印算法研究[D]. 郑州:郑州大学, 2011.
|
|
ZHAO C Y . Research on algorithm for improving the capacity of digital watermarking[D]. Zhengzhou:Zhengzhou University, 2011.
|
[5] |
ZHANG Y , YANG B , NIU X M . Reversible watermarking for relational database authentication[J]. Journal of Computers, 2006,17(2): 59-66.
|
[6] |
HU D , ZHAO D , ZHENG S . A new robust approach for reversible database watermarking with distortion control[J]. IEEE Transactions on Knowledge and Data Engineering, 2018,31(6): 1024-1037.
|
[7] |
GUPTA G , PIEPRZYK J . Reversible and blind database watermarking using difference expansion[J]. International Journal of Digital Crime and Forensics, 2009,1(2): 42-54.
|
[8] |
JAWAD K , KHAN A . Genetic algorithm and difference expansion based reversible watermarking for relational databases[J]. Journal of Systems and Software, 2013,86(11): 2742-2753.
|
[9] |
邱升红 . 面向关系数据库的可逆水印方法研究[D]. 西安:西安电子科技大学, 2018.
|
|
QIU S H . Research on reversible watermarking methods for relational databases[D]. Xi'an:Xi'an University of Electronic Science and Technology, 2018.
|
[10] |
宋岩, 沈泉江, 杨洪山 . 基于布谷鸟算法的可逆数据库水印方案[J]. 计算机应用与软件, 2021,38(12): 304-313.
|
|
SONG Y , SHEN Q H , YANG H S . A reversible database watermarking scheme based on cuckoo algorithm[J]. Computer Application and Software, 2021,38(12): 304-313.
|
[11] |
孔嘉琪, 王利明, 葛晓雪 . 基于模拟退火和粒子群混合改进算法的数据库水印技术[J]. 信息网络安全, 2022,22(5): 37-45.
|
|
KONG J Q , WANG L M , GE X X . Database watermarking technique based on simulated annealing and particle swarm hybrid improvement algorithm[J]. Information Network Security, 2022,22(5): 37-45.
|
[12] |
SHI Y , LI X , ZHANG X ,et al. Reversible data hiding:advances in the past two decades[J]. IEEE Access, 2016,4(10): 3210-3237.
|
[13] |
GE C , SUN J , SUN Y ,et al. Reversible database watermarking based on random forest and genetic algorithm[C]// 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 2020.
|
[14] |
陈青, 夏兰婷, 卜莹 . 基于两级奇异值分解的鲁棒水印算法[J]. 应用科学学报, 2020,38(6): 966-975.
|
|
CHEN Q , XIA L T , BU Y . Robust watermarking algorithm based on two-level singular value decomposition[J]. Journal of Applied Sciences, 2020,38(6): 966-975.
|
[15] |
关虎, 张桂煊, 张树武 ,等. 基于二维码的鲁棒图像水印技术及应用研究[J]. 有线电视技术, 2018(10): 20-26.
|
|
GUAN H , ZHANG G X , ZHANG S W ,et al. Research on robust image watermarking technology and application based on QR code[J]. Cable TV Technology, 2018(10): 20-26.
|
[16] |
KLEMA V , LAUB A . The singular value decomposition:its computation and some applications[J]. Automatic Control IEEE Transactions on, 1980,25(2): 164-176.
|
[17] |
STORNR P K . Differential evolution:a simple and efficient adaptive scheme for global optimization over continuous spaces[R]. 1995.
|
[18] |
TIAN J . Reversible data embedding using a difference expansion[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2003,13(8): 890-896.
|