Knuth D E. The Art of Computer Programming[M]// Seminumerical Algorithms. Massachusetts, America: Addison-Wesley, 1969.
[2]
Bergman G. A number system with an irrational base [J]. Math Magazine, 1957, 31(2):98-110. [DOI:10.2307/3029218]
[3]
Wu W J. Theorem Proving by Machine and Its Application [M].Changsha: Hunan Science Technology Press, 1999. [吴文俊. 王者之路――机器证明及其应用[M].长沙:湖南科学技术出版社,1999.]
[4]
Parry W. On the β-expansions of real numbers[J]. Acta Math. Acad. Sci. Hung, 1960,11:401-416.[DOI: 10.1007/BF02020954.]
[5]
Katai I, Szabo J. Canonical number system for complex integers [J]. Acta Sci. Math, 1975,37(3):255-260.
[6]
Gilbert W J. Fractal geometry derived from complex bases[J]. Mathematical Intelligence, 1982,4(2):78-86.
[7]
Qi D X. Fractal and Computer Generating [M]. Beijing: Science Press,1994:76-83.[齐东旭. 分形及其计算机生成[M]. 北京:科学出版社,1994:76-83.]
[8]
Sun W,Qi D X.Complex number system based algorithm for engineering graph digital watermarking[J].Journal of Image and Graphics,2003,8(spe):626-630.[孙伟,齐东旭. 基于复数系的工程图数字水印算法[J].中国图象图形学报, 2003,8(特刊):626-630.]
[9]
Sun W,Yang Z H,Qi D X. The conversion method from image to complex number and its application in image secret sharing [J]. Journal of Image and Graphics, 2004, 9(11):1331-1335.[孙伟,杨志华,齐东旭. 图像的复数表示及其在图像秘密分存中的应用[J].中国图象图形学报,2004,9(11):1331-1335.] [DOI:10.11834/jig.2004011256]
[10]
Song R X,Huang J,Sun W, et al. Coding based on complex number system and its application for information disguise[C]// Chinagraph\'2004. Xi\'an: Northwestern Polytechnical University Press,2004:324-327.[宋瑞霞,黄静,孙伟,等. 复数基系统下的编码及其在信息伪装中的应用[C]//第五届中国计算机图形学大会论文集.西安:西北工业大学出版社,2004: 324-327.]
[11]
Yu J D,Song R X,Qi D X.A scheme for steganography based on triangular partition of digital images[J].Journal of Computer Research and Development,2009,46(9):1432-1437.[余建德,宋瑞霞,齐东旭.基于数字图像三角剖分的信息伪装算法[J].计算机研究与发展,2009,46(9):1432-1437.]
[12]
Gao G Y,Li X W. Secure electronic document interchange arithmetic based on image disguise[J]. Computer Engineering, 2008, 34(21):147-149. [高光勇,黎新伍.基于图像伪装的电子文档安全交换算法[J].计算机工程,2008,34(21):147-149.]
[13]
Wang S, Li Q, Yang B, et al. A novel and secure image interpolation methods for image disguise[C]//Proceedings of 6th International conference on Intelligent Information Hiding and Multimedia Signal Processing. Darmstadt Germany: IEEE Computer Society Press, 2010:482-485. [DOI:10.1109/IIHMSP.2010.123]
[14]
Su W J. Disguise and recovery experiments of digital image information based on Matlab [J] Automation & Instrumentation, 2013, 4:191-195. [宿维军.基于Matlab 的数字图像信息的伪装与恢复实验[J].自动化与仪器仪表,2013,4:191-195.]