<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • 電子信息工程論文參考文獻

    時間:2024-08-03 06:09:05 參考文獻 我要投稿

    電子信息工程論文參考文獻范例

      在一篇論文中,引用參考文獻論證自己的觀點或者理念是十分必要的,下面是小編搜集整理的電子信息工程論文參考文獻,供大家閱讀查看。

    電子信息工程論文參考文獻范例

      參考文獻一:

      [1]王俊文,劉光杰,戴躍偉,張湛,王執(zhí)鏈.基下非抽樣Contourlet變換的圖像模糊取證[J].計算機研究與發(fā)展,2009,46(9):1549-1555.

      [2]Li-XianWei,JunjieZhu,XiaoyuanYang.AnImageForensicsAlgorithmforBlurDetectionBasedonPropertiesofSharpEdgePoints卩].AdvancedMaterialsResearch,2012,34(2):743-747.

      [3]PedroComesana.Detectionandinformationtheoreticmeasuresforquantifyingthedistinguishabilitybetweenmultimediaoperatorchains[C].//IEEEInternationalWorkshoponInformationForensicsandSecurity,2012.211-216.

      [4]PedroComesana,FernandoPerez-Gonzalez.Multimediaoperatorchaintopologyandorderingestimationbasedondetectionandinformationtheoretictools[C].//DigitalForensicsandWatermaking,2012.IWDW2012.11thInternationalWorkshoponDigitalForensicsandWatermaking,2012.213-227.

      [5]ZChen,YZhao,RNi,Detectingtheoperationchainindigitalimagesbytypeandorderfingerprint[C].//InternationalConferenceonSignalProcessing(ICSP),HangZhou,China,October19-23,2014,1837-1842.

      [6]MatthewC.Stamm,XiaoyuChu,K.J.RayLiu.ForensicallyDeterminingtheOrderofSignalProcessingOperations[C].//IEEEInternationalWorkshoponInformationForensicsandSecurity,2013.WIFS2013.Proceedingsofthe2013IEEESignalProcessingSocietyConferenceon.IEEE,2013:162-167.

      [7]M.C.Stamm,K.J.R.Liu.Forensicdetectionofimagemanipulationusingstatisticalintrinsicfingerprints[J].IEEETransactionsoninformationForensicsandSecurity,2010,5(3):492-506.

      [8]M.Kirchner.Fastandreliableresamplingdetectionbyspectralanalysisoffixedlinearpredictorresidue[C].//ACMworkshoponMultimediaandSecurity,Oxford,UnitedKingdom,2008:11-20.

      [9]M.Kirchner,J.Fridrich,Ondetectionofmedianfilteringindigitalimages[C].//ElectronicImaging:Security,Steganography,andWatermarkingofMultimediaContents,2010.ProceedingsofSPIE.MediaForensicsandSecurityII,2010:1-12.

      [10]JianweiLi,YaoZhao,RongrongNi,Detectionforprocessinghistoryofseaminsertionandcontrastenhancement[C].//Proc.ofSPIEVol,9273,2014.

      [11]HanyFarid.Creatinganddetectingdoctoredandvirtualimages:Implicationstothechildpornographypreventionact[J].DepartmentofComputerScience,DartmouthCollege,TR2004-518,2004,13.

      [12]周琳娜.數(shù)字圖像盲取證技術研究[D].北京:北京郵電人學,2007.

      [13]劉苗,鄭江濱.利小波域同態(tài)濾波的偽造圖像檢測方法[J].計算機I:程與應州,2009,45(34):169-179.

      [14]YagizSutcu,BarisCoskun,HusrevT.Senear.TamperDetectionBasedonRegularityofWaveletTransformCoefficient[C].//IEEEInternationalConferenceonImageProcessing,SanAntonio,TX,2007:397-400.

      [15]干波,孫璐璐,孔樣維,尤新剛.圖像偽造中模糊操作的異常色調率取證技術m.電+分報.2006,34(12):2451-2454.

      [16]HanyFarid.BlindInverseGammaCorrection[J].IEEETransactiononImageProcessing,2001,10(10):1428-1433.

      [17]GangCao,YaoZhao,RongrongNi.AttackingContrastEnhancementForensicsinDigitalImages[J].ScienceChinaInformationSciences,2014,57(5):1-13.

      [18]GangCao,YaoZhao,RongrongNi,AlexC.Knot.Efficientcontrastenhancementforensicswithapplicationtoimagefoi^erydetection[J].IEEETransactiononInformationForensicsandSecurity,2013.

      [19]GangCao,YaoZhao,RongrongNi.ForensicEstimationofGammaCorrectioninDigitalImages[C].//InternationalConferenceonImageProcessing,HongKong,2010:2297-2300.

      [20]王幕,張娜,潘城.數(shù)字圖像中值濾波檢測[J].廣東科技,2013,12:214-218.

      參考文獻二:

      [1]GangCao,YaoZhao,RongrongNi,LifangYu,HuaweiTian.ForensicDetectionofMediaFilteringinDigitalImages[C].//InternationalConferenceonMulimedia&Expo,Singapore,2010:89-94.

      [2]KakarPravin,NatarajanSudha,SerWee.ExposingDigitalImageForgeriesbyDetectingDiscrepanciesinMotionBlur[J].IEEETransactiononMultimedia,13(3):443-452.

      [3]KakarPravin,NatarajanSudha,SerWee.DetectingDigitalImageForgeriesThroughInconsistentMotionBlur[C].//InternationalConferenceonMulimedia&Expo,Singapore,2010:486-491.

      [4]AlinC.Popescu,HanyFarid.ExposingDigitalForgeriesbyDetectingTracesofRe-sampling[J].IEEETransactiononSignalProcessing.2005,53(2):758-767.

      [5]GangCao,YaoZhao,RongrongNi.Forensicidentificationofresamplingoperatiors:aseminon-intrusiveapproach[J].ForensicScienceInternational,2012,(216):13.

      [6]GloeT,KirchnerM,WinklerA.CanWeTrustDigitalImageForensics?[C].//ProceedingsofInternationalConferenceonMultimedia,NewYork,ACM.2007:78-86.

      [7]KirchnerM,BoehmeR.HidingTracesofResamplinginDigitalImages[J].IEEETransactionsonInformationForensicsandSecurity,2008,3(4):582-592.

      [8]S.Avidan,A.Shamir.Seamcarvingforcontent-awareimageresizing[J].ACMTrans.Graph,2007,26(3):10.

      [9]A.Sarkar,L.Nataraj,B.S.Manjunath.Detectionofseamcarvingandlocalizationofseaminsertionsindigitalimages[C].//Proc,ofthe11thACMworkshoponMM&SEC,2009,107-116.

      [10]Dun-YuHsiao,Soo-ChangPei.DetectingDigitalTamperingbyBlurEstimation[C].//In1stInternationalWorkshoponSystematicApproachestoDigitalForensicEngineering,2005:264-278.

      [11]M.Walter,"OpenSESAME:ATool'sConcept",Proc.OftheSatelliteWorkshopsofthe27thIntl.ColloquiumonAutomataLanguages,andProgramming,Nov.2000

      [12]K.K.Vemuri,J.B.Dugan,K.J.Sullivan,"Automaticsynthesisoffaulttreesforcomputer-basedsystems”,IEEETrans,onRel.,Vol.48,No.4,Dec.1999,pp.394-402

      [13]T.S.Assaf,AutomatedreliabilityanalysisofcomputerbasedsystemsusingUML,MSEEThesis,Dept.ofECE,Univ.ofVirginia,Jan.2001.

      [14]張釗謙,夏濤,張貝克,等.SDG自動生成故障樹軟件的研究與幵發(fā)[J].系統(tǒng)仿真學報,2003,15(10):1391-1393.

      [15]WhalenMW.AformalsemanticsforRSML-e[D].Master'sthesis,UniversityofMinnesota,2000.

      [16]MillerSP,TribbleAC,HeimdahlMPE.Provingtheshalls[M]//FME2003:FormalMethods.SpringerBerlinHeidelberg,2003:75-93.

      [17]BiehlM,DeJiuC,TorngrenM.Integratingsafetyanalysisintothemodel-baseddevelopmenttoolchainofautomotiveembeddedsystems[C]//ACMSigplanNotices.ACM,2010,45(4):125-132.

      [18]JoshiA,MillerSP,WhalenM,etal.Aproposalformodel-basedsafetyanalysis[C]//DigitalAvionicsSystemsConference,2005.DASC2005.The24th.IEEE,2005,2:13pp.Vol.2.1stInternationalWorkshoponSystematicApproachestoDigitalForensicEngineering,2005:264-278.

      [19]BoochG.ObjectOrientedAnalysis&DesignwithApplication[M].PearsonEducationIndia,2006.

      [20]DouglassBP.Real-timeUML:developingefficientobjectsforembeddedsystems[M].Addison-WesleyLongmanPublishingCo.,Inc.,1997.

      [21]JacobsonI.Objectorientedsoftwareengineering:ausecasedrivenapproach[J].1992.

      [22]BoochG,RumbaughJ,JacobsonI.Theunifiedmodelinglanguageuserguide[M].PearsonEducationIndia,1999.

      [23]McUmberWE,ChengBHC.UML-basedanalysisofembeddedsystemsusingamappingtoVHDL[C]//High-AssuranceSystemsEngineering,1999.Proceedings.4thIEEEInternationalSymposiumon.IEEE,1999:56-63.

      [24]IBMRationalSoftwareArchitect建模[M].電子工業(yè)出版社,2008.

      [25]GuideGS.Real-TimeWorkshop⑧7[J].2002.

      [26]KletzTA.Hazop~~pastandfuture[J].ReliabilityEngineering&SystemSafety,1997,55(3):263-266.

      [27]HenleyEJ,KumamotoH.Reliabilityengineeringandriskassessment[M].EnglewoodCliffs(NJ):Prentice-Hall,1981.


    【電子信息工程論文參考文獻】相關文章:

    電子信息工程論文參考文獻11-30

    工程論文參考文獻11-17

    工業(yè)工程論文參考文獻04-30

    關于電子信息工程的論文01-01

    電子信息工程論文模板11-29

    電子工程論文參考文獻格式11-19

    工程學論文參考文獻05-18

    網(wǎng)絡工程論文參考文獻10-28

    電氣工程論文參考文獻03-20

    通信工程論文參考文獻03-10

    主站蜘蛛池模板: 精品熟女少妇av免费久久| 国产精品福利在线播放| 国产精品乱码高清在线观看| 国产精品无码v在线观看| 日本午夜精品一区二区三区电影| 国产免费伦精品一区二区三区| 国产精品99精品无码视亚| 香港aa三级久久三级老师2021国产三级精品三级在 | 亚洲国产精品碰碰| Xx性欧美肥妇精品久久久久久| 国产精品污WWW在线观看| 中文字幕av日韩精品一区二区| 久久99精品久久久久久齐齐| 成人亚洲日韩精品免费视频| 国产午夜精品视频| 国产精品视频一区二区三区四| 亚洲AV无码成人精品区天堂 | 久久伊人精品青青草原日本| 99精品视频在线观看婷| 久久99国产精品久久久| 国产AV午夜精品一区二区入口| 久久亚洲中文字幕精品有坂深雪 | 欧美精品亚洲精品日韩| 亚洲高清国产拍精品26U| 久久精品这里只有精99品| 国产精品哟女在线观看| 成人精品视频成人影院| 亚洲嫩草影院久久精品| 精品无人区麻豆乱码1区2区| 99国产精品一区二区| 97精品国产一区二区三区| 精品国产三级a∨在线欧美| 久久香综合精品久久伊人| 午夜精品久久久久久久久| 亚洲国产精品一区二区成人片国内 | 亚洲精品无码久久久久AV麻豆| 久久久久无码精品国产app| 国产一区二区三区欧美精品| 精品国产亚洲男女在线线电影 | 国产精品va久久久久久久| 国产精品成人一区二区|