[2] Lin Liyu, Zhang Youyan, Sun Tao. Contourlet Transform—Image Processing Application[M]. Beijing: Science Press, 2008
[3] Wang Shiyong. Study on Laser-Induced CCD Detector Vulnerability and Survivability and Fussy Synthetic Evaluation on CCD[D]. Changchun: Changchun Institudte of Optics, Fine Mechanics and Physics, Chinese Academy of Sciences, 2002. 21~30
[4] Li Xiuqian, Cheng Xiangai, Wang Rui et al.. Experimental study on the response of HgCdTd(PC) detector irradiated by laser[J]. High Power Laser and Particle Beams, 2003, 15(1): 41~45
[5] He Yuanxing, Jiang Houman. Abnormal response of PV-type HgCdTe detector under intense laser irradiation [J]. High Power Laser and Particle Beams, 2008, 20(8): 1232~1237
[6] Liu Yanwu. Experiment research on laser disturbing CCD detectors[J]. Laser Journal, 2011, 32(1): 55~56
[7] Li Xiuqian, Cheng Xiangai, Lu Qisheng et al.. The study on the response character of HgCdTe detectors under laser irradiation [J]. J. Academy of Equipment Command & Technology, 2004, 15(2): 113~116
[8] Wang Yuqing, Liu Weiya, Wang Yong. Image quality assessment based on local variance and structure similarity[J]. J. Optoelectronics· Laser, 2008, 19(11): 1546~1553
[9] Zhang Hua. Research on Image Quality Assessment Based on Visual Perception[D]. Hangzhou: Zhejiang University, 2009
[10] Bo Wang, Zhibing Wang, Yupeng Liao et al.. HVS-based structural similarity for image quality assessment[C]. Processings of IEEE International Conference on Signal Processing, 2008: 1194. 1197
[11] Sun Yunqiang. Investigation of the Quality Assessment Aimed at Laser-Disturbed Image [D]. Changsha: National University of Defense Technology, 2006. 21~30
[12] Wei Guanghui, Yang Peigen. Laser Technology in the Weapons Industry[M]. Beijing: Weapon Industry Press, 1995. 162~165
[13] Zhao Dapeng, Shi Jiamingl. Effectiveness evaluation method based on the image characteristic for imaging guidance countermeasures [J]. Laser & Infrared, 2005, 35(8): 509~601
[15] Zhou Jingchao, Dai Ruwei, Xiao Bohua. Overview of image quality assessment research [J]. Computer Science, 2008, 35(7): 1~5