1Jeong MK, Lu JC, Wang N. Wavelet-Based SPC Procedure for Complicated Functional Data. Interna- tional Journal of Production Research. 2006, 44(4):729 - 744. 被引量:1
2Jeong MK, Chen D, Lu JC. Thresholded Scalogram and Its Application in Process Fault Detection. Applied Stochastic Models in Business and Industry. 2003, 19(3):231 - 244. 被引量:1
3Karras P, Mamoulis N. One-pass wavelet synopses for maximum-error metrics. Proc. of the 31st international conference on Very large data bases. August 30- September 02, 2005, Trondheim, Norway. 被引量:1
4Garofalakis M, Gibbons PB. Wavelet synopses with error guarantees. Proc. of SIGMOD Conf, 2002:476 - 487. 被引量:1
5Garofalakis M. Kumar A. Deterministic wavelet thresholding for maximum-error metrics. Proc. of PODS, 2004:166- 176. 被引量:1
6Mallat S, Hwang WL. Singularity Detection and Processing with wavelets. IEEE transac- tions on information theory, 1992,38(2):617 - 643. 被引量:1
1SUN Q. Singularity analysis using continuous wavelet transform for bearing fault diagnosis[J]. Mechanical systems and Signal Processing, 2002,16 (6): 1025-1041. 被引量:1
2MALLAT Stephane. Singularity detection and processing with wavelets [J]. IEEE Transaction on information heory. 1992, 38(2):617-643. 被引量:1
3MALLAT Stephane. Characterization of signals from multiscale edges [J]. IEEE Transactions on Pattern Analysis and machine intelligence, 1992,14 (7) :710-732. 被引量:1
3Wang W, Farid H. Exposing digital forgeries in video by detecting duplication. Proceedings of the 9^th Workshop on Multimedia and Security. New York,USA, 2007: 35-42. 被引量:1
4Wang W, Farid H. Exposing digital forgeries in interlaced and deinterlaced video. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 438-449. 被引量:1
5Wang W, Farid H. Detecting re-projected video. Information Hiding:The 10^th International Workshop, IH2008. Santa Barbara, CA, 2008, 72-86. 被引量:1
6Wang W H, Farid H. Exposing digital forgeries in video by detecting double MPEG compression. Proceedings of the Multimedia and Securit3/ Workshop. Geneva, Switzerland. ACM, 2006: 37-47. 被引量:1
7Wang W H, Farid H. Exposing digital forgeries in video by detecting double quantization. ACM Multimedia and Security Workshop. Princeton, 2009,39-48. 被引量:1
8Shih T, Tsai J, Tang N, etal. Video forgery. Future Generation Information Technology, 2009, 7-11. 被引量:1
9Shih T, Tsai J, Tang N, et al. Video forgery and special effect production. Visual Informatits: Bridging Research and Practice, 2009, 35- 37. 被引量:1
10I.ukas J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Transactions on Information Forensics and Security, 2006, 1(2): 205-214. 被引量:1