References
- A. K. Jain, and S. K. Jena. “Application of intrusion detection system in automatic evidence collection using digital forensics,” 2014.
- E. Casey. Handbook of Digital Forensics and Investigation. Lausanne, Switzerland: Elsevier Inc., Copyright Eoghan Casey, 2010.
- “Log likelihood function”, Wikipedia article. Available: https://en.wikipedia.org/wiki/Likelihood_function#Log-likelihood.
- G. Ferrari, and R. Raheli. Ldpc Coded Modulations. Berlin: Springer-Verlag Berlin Heidelberg, 2009.
- B. M. J. Leiner. “LDPC codes- a brief Tutorial”, April 8, 2005.
- W. E. Ryan. “An introduction to LDPC codes”, August, 19, 2003.
- “Using continuous verses discrete wavelet transform in digital applications,” Stackexchange question. Available: http://dsp.stackexchange.com.
- A. Thangaraj, and S. Bhashyam, “Special issue on multi-terminal information theory,” Int J Adv Eng Sci Appl Math., Vol. 5, no. 1, p. 1, 2013. doi:https://doi.org/10.1007/s12572-013-0085-3
- S. Johnson. Low-Density Parity-Check Codes from Combinatorial Designs. Callaghan, Australia: The University of Newcastle, April 2004.
- T. Richardson, A. Shokrollahi, and R. Urbanke, “Design of capacity-approaching irregular low- density parity-check codes,” IEEE Trans. Inform. Theory, Vol. 47, pp. 619–637, 2001. doi: https://doi.org/10.1109/18.910578
- S. Johnson. “Introducing low-density parity-check codes”. [Online]. Available: http://sigpromu.org/sarah/SJohnsonLDPCintro.pdf.
- M. Sifuzzaman, M. R. Islam, and M. Z. Ali, “Application of wavelet transform and its advantages compared to fourier transform,” Journal of Physical Sciences, Vol. 13, pp. 121–34, 2009.
- L. Chun-Lin. “A tutorial of the wavelet transform,” February 23, 2010.
- “Continuous wavelet transform and scale-based analysis.” Available: http://in.mathworks.com/help/wavelet/gs/continuous-wavelet-transform-and-scale-based-analysis.html
- Misiti et al. “Wavelet toolbox for use with MATLAB,” Tech. manual, Available: http://web.mit.edu/1.130/WebDocs/wavelet_ug.pdf
- R. Ejbali, M. Zaied, and C. B. Amar, “Multi-input multi-output beta wavelet network: modeling of acoustic units for speech recognition,” (IJACSA) Int. J. Adv. Comput. Sci. Appl., Vol. 3, no. 4, pp. 38–44, 2012.
- H. Li, L. Fu, and H. Zheng, “Bearing fault diagnosis based on amplitude and phase map of Hermitian wavelet transform,” J. Mech. Sci. Technol., Vol. 25, pp. 2731–40, 2011. doi: https://doi.org/10.1007/s12206-011-0717-0
- M. Vetterli, and T. A. Tony Verma. Filterbank Implementation of Meyer’s Wavelet. California: Stanford University, June 1998.
- X. Mi, and H. Ren, “The use of the Mexican hat and the morlet wavelets for detection of ecological patterns,” Plant Ecol., Springer, Vol. 179, no. 1, pp. 1–19, 2005. doi: https://doi.org/10.1007/s11258-004-5089-4
- R. Danesfahani, and S. Hatamzadeh-Varmazyar, “Applying Shannon wavelet basis functions to the method of moments for evaluating the radar cross section of the conducting and resistive surfaces,” Prog. Electromagn. Res. B, Vol. 8, pp. 257–292, 2008. doi: https://doi.org/10.2528/PIERB08062601
- A. Shokrollahi. LDPC Codes: An Introduction. 39141 Civic Center Drive, Fremont, CA 94538: Digital Fountain, Inc, April 2003.
- T. Richardson, and R. Urbanke, “The capacity of low-density parity check codes under message-passing decoding,” IEEE Trans. Inform. Theory, Vol. 47, pp. 599–618, 2001. doi: https://doi.org/10.1109/18.910577
- X. Lin, and C.-T. Li, “Preprocessing reference sensor pattern noise via spectrum equalization,” IEEE Trans. On Information Forensics and Security, Vol. 11, no. 1, pp. 126–40, 2016. doi: https://doi.org/10.1109/TIFS.2015.2478748
- Y. Cao, T. Gao, L. Fan, and Q. Yang, “A robust detection algorithm for copy-move forgery in digital images,” Forensic Sci. Int., Vol. 214, pp. 33–43, 2012. doi: https://doi.org/10.1016/j.forsciint.2011.07.015