[1] |
马兆丰, 范科峰, 陈铭 等. 支持时空约束的可信数字版权管理安全许可协议[J]. 通信学报, 2008,29(10):153-163. MA Z F , FAN K F , CHEN M , et al. Trusted digital rights management protocol supporting for time and space constraint[J]. Journal on Communications, 2008,29(10):153-163.
|
[2] |
蒋铭, 马兆丰, 辛宇 等. 基于 DWT 和视觉加权的图像质量评价方法研究[J]. 通信学报, 2011,32(9):129-136. JIANG M , MA Z F , XIN Y , et al. Image quality evaluation method base on digital wavelet transform and vision weighted[J]. Journal on Communications, 2011,32(9):129-136.
|
[3] |
冯涛, 韩纪庆 . 双声道音频水印的同步及盲检测算法[J]. 通信学报, 2006,27(10):62-68. FENG T , HAN J Q . Synchronization and blind detect algorithm for dual channel audio watermark[J]. Journal on Communications, 2006,27(10):62-68.
|
[4] |
孙中伟, 朱岩, 冯登国 . DCT域图像水印的局部优化检测性能研究[J]. 电子学报, 2005,33(5):864-867. SUN Z W , ZHU Y , FENG D G . Performance analysis of DCT-domain watermark detection based on local optimum detection[J]. Acta Electronica Sinica, 2005,33(5):864-867.
|
[5] |
AKHAEE M A , SAHRAEIAN S M E , MARVASTI F . Contourlet-based image watermarking using optimum detector in a noisy environment[J]. IEEE Transactions on Image Processing, 2010,19(4): 967-980.
|
[6] |
GUNSEL B , ULKER Y , ULKERULKER S . A statistical framework for audio watermark detection and decoding[A]. Multimedia Content Representation,Classification and Security[C]. Springer Berlin Heidelberg, 2006. 241-248.
|
[7] |
林晓丹 . 基于高斯混合模型的 DCT 域水印检测方法[J]. 自动化学报, 2012,38(9):1445-1448. LIN X D . DCT-domain watermark detection using Gaussian mixture model[J]. Acta Automatica Sinica, 2012,38(9):1445-1448.
|
[8] |
DEMPSTER A P , LAIRD N M , RUBIN D B . Maximum likelihood from incomplete data via the EM algorithm[J]. Journal of the Royal Statistical Society.Series B (Methodological), 1977,39(1): 1-38.
|
[9] |
SHINOZAKI T , OSTENDORF M . Cross-validation EM training for robust parameter estimation[A]. Proceedings of the 2007 IEEE International Conference on Acoustics,Speech and Signal,ICASSP 2007[C]. 2007.IV-437-IV-440.
|
[10] |
MOATTAR M H , HOMAYOUNPOUR M M . Text-independent speaker verification using variational Gaussian mixture model[J]. ETRI Journal, 2011,33(6): 914-923.
|
[11] |
CORDUNEANU A , BISHOP C M . Variational bayesian model selection for mixture distributions[A]. Artificial Intelligence and Statistics[C]. Waltham,MA: Morgan Kaufmann 2001. 27-34.
|
[12] |
COX I J , KILIAN J , LEIGHTON F T , et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997,6(12): 1673-1687.
|
[13] |
KIROVSKI D , MALVAR H S . Spread-spectrum watermarking of audio signals[J]. IEEE Transactions on Signal Processing, 2003,51(4): 1020-1033.
|
[14] |
MALIK H , KHOKHAR A , ANSARI R . Improved watermark detection for spread-spectrum based watermarking using independent component analysis[A]. Proceedings of the 5th ACM Workshop on Digital Rights Management[C].ACM 2005. 102-111.
|
[15] |
BISHOP C M , NASRABADI N M . Pattern Recognition and Machine Learning[M]. New York: Springer, 2006.
|
[16] |
WEYCHAN R , MARCINIAK T . Analysis of differences between MFCC after multiple GSM transcodings[J]. Przegl?d Elektrotechniczny Selected Full Texts, 2012,88(6): 24-29.
|
[17] |
BESSON O , BIDON S , TOURNERET J Y . Covariance matrix estimation with heterogeneous samples[J]. IEEE Transactions on Signal Processing, 2008,56(3): 909-920.
|
[18] |
G?RüR D , RASMUSSEN C E . Dirichlet process Gaussian mixture models:choice of the base distribution[J]. Journal of Computer Science and Technology, 2010,25(4): 653-664.
|
[19] |
MURPHY K P . Conjugate Bayesian Analysis of the Gaussian Distribution[R]. Technical Report,UBC, 2007.
|
[20] |
DO M N , VETTERLI M . Wavelet-based texture retrieval using generalized Gaussian density and Kullback-Leibler distance[J]. IEEE Transactions on Image Processing, 2002,11(2): 146-158.
|
[21] |
SHRIBERG E , FERRER L , KAJAREKAR S , et al. Modeling prosodic feature sequences for speaker recognition[J]. Speech Communication, 2005,46(3): 455-472.
|
[22] |
STEINEBACH M , PETITCOLAS F A P , RAYNAL F , et al. StirMark benchmark:audio watermarking attacks[A]. Proceedings of the 2011 International Conference on Information Technology:Coding and Computing[C]. 2001. 49-54.
|