[1] |
SUN Xinhao, WANG Kaixi.
Codeword Replacement Based on Shortest Euclidean Distance for VoIP Steganography
[J]. Computer Engineering and Applications, 2022, 58(13): 128-134.
|
[2] |
CHEN Sheng, LI Zhi.
Image Steganography Location Research Based on Pixel Probability Prediction
[J]. Computer Engineering and Applications, 2022, 58(12): 85-93.
|
[3] |
DENG Lifang, DANG Jianwu, WANG Yangping, WANG Song.
Steganalysis of Spatial Image Based on Hybrid Kernel Feature Mapping
[J]. Computer Engineering and Applications, 2021, 57(9): 118-125.
|
[4] |
XIAO Ruixue, FENG Yingwei, QU Jianping.
Steganalysis of Variable Size Image Based on Efficient Feature Fusion
[J]. Computer Engineering and Applications, 2021, 57(24): 126-134.
|
[5] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[6] |
GAO Peixian1,2, WEI Lixian1,2, LIU Jia1,2, LIU Mingming1,2.
Image steganalysis based on densely connected convolutional networks
[J]. Computer Engineering and Applications, 2018, 54(15): 74-77.
|
[7] |
LI Meng, ZHAI Jiangtao, DAI Yuewei.
Steganalysis to multipath encoding based on conditional entropy
[J]. Computer Engineering and Applications, 2018, 54(1): 117-121.
|
[8] |
MEI Xue, LIU Yuan, WU Haotian.
Study on JPEG steganography based on syndrome-trellis codes and multi-band embedding
[J]. Computer Engineering and Applications, 2016, 52(20): 118-121.
|
[9] |
GUO Honggang, YAN Diqun, WANG Rangding, WANG Zhangyan, WANG Lin, TU Linqiang.
MP3 Steganalysis based on difference statistics
[J]. Computer Engineering and Applications, 2015, 51(7): 88-92.
|
[10] |
XIANG Lingyun, HU Yijun, WANG Weizheng.
Text steganographic algorithm based on prior substitution with low distortion
[J]. Computer Engineering and Applications, 2015, 51(15): 102-106.
|
[11] |
ZHANG Mingchao, CAI Xiaoxia, CHEN Hong.
Quantitative JPEG images steganalysis algorithm based on manifold learning
[J]. Computer Engineering and Applications, 2014, 50(21): 175-179.
|
[12] |
SUN Ziwen, LI Hui.
SVR-based steganalysis method used for estimating embedding rate
[J]. Computer Engineering and Applications, 2013, 49(5): 84-87.
|
[13] |
WANG Jijun.
Algorithm for reversible watermarking based on location map
[J]. Computer Engineering and Applications, 2013, 49(4): 87-90.
|
[14] |
SUN Xinmei1, MENG Peng2, HUANG Liusheng2,3.
Simple and practical information hiding algorithm for Chinese text
[J]. Computer Engineering and Applications, 2013, 49(15): 88-91.
|
[15] |
WU Xingjia.
Study on encryption technology based on Fresnel transform
[J]. Computer Engineering and Applications, 2013, 49(12): 90-92.
|