[1] |
XUE Juntao, JIN Zhigang, YANG Zhengling, ZHANG Jun.
Analysis of watermarking model based on similarity of vectors
[J]. Computer Engineering and Applications, 2016, 52(24): 116-120.
|
[2] |
KANG Liangcheng, LI Chaofeng.
JPEG compressed image quality assessment method based on digital watermarking in contourlet domain
[J]. Computer Engineering and Applications, 2016, 52(21): 206-210.
|
[3] |
JIANG Ce, PENG Jian, XIANG Lingyun, LI Feng.
Research on text reversible digital watermarking based on Hamming code
[J]. Computer Engineering and Applications, 2016, 52(11): 84-87.
|
[4] |
HUANG Dong, YANG Wan’an.
Robust digital watermarking by balancing feature points based on Harris-Laplacian
[J]. Computer Engineering and Applications, 2015, 51(7): 101-105.
|
[5] |
TONG Peng1, LU Yang1, WU Lei1,2.
Research on extended ODRL model based on sectional control
[J]. Computer Engineering and Applications, 2014, 50(13): 82-86.
|
[6] |
XIAO Yun, XIAO Mingbo.
Digital rights management system based on characteristic images
[J]. Computer Engineering and Applications, 2014, 50(11): 105-109.
|
[7] |
WU Baiyan1, LI Chaokui1, WANG Wei2.
Vector map data watermarking model controlling curve shape distortion
[J]. Computer Engineering and Applications, 2014, 50(1): 74-77.
|
[8] |
ZHAO Yong, XIONG Shunqing, YUAN Sha, XIA Wei, ZHOU Weihong.
Multiple transform domain watermarking algorithm based on NSCT decomposition DCT transform and SVD decomposition
[J]. Computer Engineering and Applications, 2013, 49(20): 167-170.
|
[9] |
LIN Kezheng, YAO Huan.
Digital image watermarking algorithm based on HCM and DT-CWT
[J]. Computer Engineering and Applications, 2013, 49(18): 167-170.
|
[10] |
ZHANG Fengmei, HAN Yadan, YAN Deqin.
Adaptive digital watermarking based on HVS and quantization
[J]. Computer Engineering and Applications, 2012, 48(34): 92-96.
|
[11] |
TAN Guolv.
Digital watermarking algorithm for PDF document
[J]. Computer Engineering and Applications, 2012, 48(32): 85-88.
|
[12] |
LIU Jingjie1, TAO Liang2.
Robust image zero-watermarking using non-negative matrix factorization
[J]. Computer Engineering and Applications, 2012, 48(16): 90-93.
|
[13] |
CAI Zongyin1, LIANG Rong2, ZHOU Qing3.
Method to embed information to electronic seals
[J]. Computer Engineering and Applications, 2012, 48(12): 78-82.
|
[14] |
ZHENG Xuping1, ZHANG Aixin2, LI Shenghong1.
Spread transform’s effect on anti-collusion performance of quantization based digital fingerprinting
[J]. Computer Engineering and Applications, 2012, 48(10): 89-94.
|
[15] |
ZHAO Wenxian, WANG Ling, YANG Yunyi.
Color image watermarking algorithm in NSCT-SVD based on SIFT
[J]. Computer Engineering and Applications, 2012, 48(10): 106-110.
|