[1] Liu Taixiang. Summary of the study on stone-carving in the Han dynasty[J]. Academic Forum of Nandu (Journal of the Humanities and Social Sciences), 2002, 22(3): 8-18.
[2] Guo Quanmin, Liu Caizhen. Pavement crack detection method in concrete pavement disease detection and estimation system[J]. Foreign Electronic Measurement Technology, 2015, 34(7): 47-50.
[3] Wang X N, Wang X N, Hou D X, et al. Surface crack imaging based on delayed temperature difference at symmetric points by laser spot thermography[J]. Instrumentation, 2014, 1(2): 30-37.
[4] Nie Fangyan, Li Jianqi, Zhang Pingfeng, et al. A threshold selection method for image segmentation based on Tsallis relative entropy[J]. Laser & Optoelectronics Progress, 2017, 54(7): 071002.
[5] Xu Huan, Li Zhenbi, Jiang Yuanyuan, et al. Pavement crack detection based on OpenCV and improved Canny operator[J]. Computer Engineering and Design, 2014, 35(12): 4254-4258.
[6] Zhao Fangzhen, Liang Haiying, Wu Xianglin, et al. Active contour segmentation model based on local and global Gaussian fitting[J]. Laser & Optoelectronics Progress, 2017, 54(5): 051006.
[7] Xie Zhinan, Zheng Dong, Chen Jiayao, et al. A tumor segmentation method of improved Chan-Vese model for liver cancer ablation computed tomography image[J]. Laser & Optoelectronics Progress, 2017, 54(2): 021702.
[8] Cornelis B, Ruzic T, Gezels E, et al. Crack detection and inpainting for virtual restoration of paintings: the case of the Ghent Altarpiece[J]. Signal Processing, 2013, 93(3): 605-619.
[9] Wang Kai, Wang Huiqin, Wu Meng. Virtual restoration method of cracks in mural[J]. Computer Engineering and Applications, 2014, 50(15): 136-139.
[10] Padalkar M G, Joshi M V. Auto-inpainting heritage scenes: a complete framework for detecting and infilling cracks in images and videos with quantitative assessment[J]. Machine Vision and Applications, 2015, 26(2/3): 317-337.
[11] Wagner R A, Fischer M J. The string-to-string correction problem[J]. Journal of the ACM (JACM), 1974, 21(1): 168-173.
[12] Zhou Hanping. Study on application of Levenshtein distance in programming test automatic scoring[J]. Computer Applications and Software, 2011, 28(5): 328-331.
[13] Zhao Zuopeng, Yin Zhimin, Wang Qianping, et al. An improved algorithm of Levenshtein distance and its application in data processing[J]. Journal of Computer Applications, 2009, 29(2): 424-426.
[14] Davanzo G, Medvet E, Bartoli A. Anomaly detection techniques for a web defacement monitoring service[J]. Expert Systems with Applications, 2011, 38(10): 12521-12530.
[15] Levenshtein V I. Binary codes capable of correcting deletions, insertions and reversals[J]. Soviet Physics Doklady, 1966, 10(1): 707-710.
[16] Dai Qingyun, Yu Yinglin. The advances of mathematical morphology in image processing[J]. Control Theory & Applications, 2001, 18(4): 478-482.
[17] Jiang Hua, Han Anqi, Wang Meijia, et al. Solution algorithm of string similarity based on improved Levenshtein distance[J]. Computer Engineering, 2014, 40(1): 222-227.
[18] Qu Zhong, Lin Lidan, Guo Yang. Algorithm of image crack detection based on morphology and region extends[J]. Computer Science, 2014, 41(11): 297-300.