4Feng J N. The improvement application and promotion of the electronic invoice [J]. Modern Business Magazine, 2012, 32: 65. 被引量:1
5Guo L, Bao N. Electronic invoice development analysis [J]. Accounting Information, 2012, 6: 62-63. 被引量:1
6Jiann D L, Yaw H C, Tao Y. Lossless data hiding for VQ indices based on neighboring correlation [J]. Information Science, 2013, 221: 419-438. 被引量:1
7He H J, Zhang J S. Self-recovery fragile watermarking using block-neighborhood tampering characterization[C]//Information Hiding, International Workshop, 2009: 132-145. 被引量:1
8Zhang X P, Qian Z X, Ren G R. Watermarking with flexible self-recovery quality based on compressive sensing and compositive reconstruction [J]. IEEE Transactions on Information Forensics and Security, 2011, 6(4): 1223-1232. 被引量:1
9Qin C, Chang C C, Chen K N. Adaptive self-recovery for tampered images based on VQ indexing and inpainting [J]. Signal Processing, 2013, 93(4): 933-946. 被引量:1
10Pawel K, Andrzej D. Adaptive self-embedding scheme with controlled reconstruction performance[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(2): 169-181. 被引量:1