[1] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[2] |
ZHAO Feng1, WU Chengmao2.
High performance hyper-chaotic system constructed with sine function and its application in infrared image security protection
[J]. Computer Engineering and Applications, 2018, 54(11): 67-75.
|
[3] |
LI Meng, ZHAI Jiangtao, DAI Yuewei.
Steganalysis to multipath encoding based on conditional entropy
[J]. Computer Engineering and Applications, 2018, 54(1): 117-121.
|
[4] |
MEI Xue, LIU Yuan, WU Haotian.
Study on JPEG steganography based on syndrome-trellis codes and multi-band embedding
[J]. Computer Engineering and Applications, 2016, 52(20): 118-121.
|
[5] |
XIANG Lingyun, HU Yijun, WANG Weizheng.
Text steganographic algorithm based on prior substitution with low distortion
[J]. Computer Engineering and Applications, 2015, 51(15): 102-106.
|
[6] |
WANG Jijun.
Algorithm for reversible watermarking based on location map
[J]. Computer Engineering and Applications, 2013, 49(4): 87-90.
|
[7] |
FENG Fan1,2, WANG Jianhua1, ZHANG Zhengbao2, WANG Huiping1, QI Hongjun1, ZHANG Hailong1.
Blind extraction algorithm of embedded messages based on CSR-ICA
[J]. Computer Engineering and Applications, 2013, 49(24): 70-73.
|
[8] |
LI Caiqiu, ZHOU Yajian, WEI Gengyu.
Information hiding methods research and improvement based on FTP protocol
[J]. Computer Engineering and Applications, 2013, 49(21): 111-113.
|
[9] |
SUN Xinmei1, MENG Peng2, HUANG Liusheng2,3.
Simple and practical information hiding algorithm for Chinese text
[J]. Computer Engineering and Applications, 2013, 49(15): 88-91.
|
[10] |
WU Xingjia.
Study on encryption technology based on Fresnel transform
[J]. Computer Engineering and Applications, 2013, 49(12): 90-92.
|
[11] |
TANG Mingwei1,2, HU Jie3, FAN Mingyu1, ZHENG Xiulin4.
Efficient high payload and Randomly selected sub-blocks image Steganography
[J]. Computer Engineering and Applications, 2012, 48(36): 23-26.
|
[12] |
LIN Junhai1, TANG Xianghong1,2, HE Zhangju1.
Research of image tampering recovery based on correct-encode
[J]. Computer Engineering and Applications, 2012, 48(30): 205-209.
|
[13] |
JIANG Yu, HU Aiqun, KONG Fancheng.
Design of whitening information hiding and protection equipment
[J]. Computer Engineering and Applications, 2012, 48(26): 81-83.
|
[14] |
WU Fubao, XIE Chunhui, MEI Ke.
Steganalysis for MP3 based on modified Markov and joint density features
[J]. Computer Engineering and Applications, 2012, 48(10): 115-119.
|
[15] |
CHEN Tao1,WU Min2,ZHANG Biao3.
Parity quantization of DCT coefficient on text information hiding
[J]. Computer Engineering and Applications, 2011, 47(9): 127-129.
|