相似文献/References:
[1]杨智 王运琼 冯乔生 罗可 冉婕 章秀君.一种有关DWT与SVD相结合的多功能水印新方案[J].计算机技术与发展,2010,(07):140.
YANG Zhi,WANG Yun-qiong,FENG Qiao-sheng,et al.New Multi-function Watermark Scheme Based on DWT and SVD[J].,2010,(02):140.
[2]李占德 张政保 刘会英 文家福.一种改进的基于循环块相关的脆弱水印认证算法[J].计算机技术与发展,2010,(09):161.
LI Zhan-de,ZHANG Zheng-bao,LIU Hui-ying,et al.An Improved Fragile Watermarking Authentication Algorithm Based on Circular-Block Dependence[J].,2010,(02):161.
[3]吴杨 矫文成 赵新杰 王韬 吴克辉.引入Hash函数的抗差分故障分析模型研究[J].计算机技术与发展,2011,(05):166.
WU Yang,JIAO Wen-cheng,ZHAO Xin-jie,et al.Research in Anti-DFA Model with Hash Function[J].,2011,(02):166.
[4]王淦,张文英. S HA-3轮函数中ρ、π及χ变换的逆变换[J].计算机技术与发展,2014,24(12):151.
WANG Gan,ZHANG Wen-ying. Inverse Mappings ofρ、πand χMappings in SHA-3 Permutation[J].,2014,24(02):151.
[5]董峰,金俭. 一种基于混沌脆弱水印的可逆双层图像认证方案[J].计算机技术与发展,2016,26(06):92.
DONG Feng,JIN Jian. A Two-level Reversible Image Authentication Scheme Based on Chaotic Fragile Watermark[J].,2016,26(02):92.