[1] |
XIE Guobo, JIANG Xianzhi.
Double chaotic image encryption algorithm based on two dimensional discrete fractional Fourier transform
[J]. Computer Engineering and Applications, 2018, 54(3): 40-45.
|
[2] |
XIE Guobo, DENG Huajun.
Image encryption algorithm based on quantum chaos and fractional Fourier transform
[J]. Computer Engineering and Applications, 2018, 54(17): 214-220.
|
[3] |
MA Lei1, ZHAO Yongjun1, ZHAO Chuang1, ZHU Jiandong2.
Detection and parameter estimation of STLFMCW signal based on periodic FRFT
[J]. Computer Engineering and Applications, 2017, 53(1): 134-141.
|
[4] |
XUE Juntao, JIN Zhigang, YANG Zhengling, ZHANG Jun.
Analysis of watermarking model based on similarity of vectors
[J]. Computer Engineering and Applications, 2016, 52(24): 116-120.
|
[5] |
KANG Liangcheng, LI Chaofeng.
JPEG compressed image quality assessment method based on digital watermarking in contourlet domain
[J]. Computer Engineering and Applications, 2016, 52(21): 206-210.
|
[6] |
JIANG Ce, PENG Jian, XIANG Lingyun, LI Feng.
Research on text reversible digital watermarking based on Hamming code
[J]. Computer Engineering and Applications, 2016, 52(11): 84-87.
|
[7] |
HUANG Dong, YANG Wan’an.
Robust digital watermarking by balancing feature points based on Harris-Laplacian
[J]. Computer Engineering and Applications, 2015, 51(7): 101-105.
|
[8] |
ZANG Yilin, YU Fengqin.
Multi-component Chirp signal separation using pseudo Wigner-Ville distribution in short-time fractional Fourier domain
[J]. Computer Engineering and Applications, 2014, 50(4): 211-214.
|
[9] |
WU Baiyan1, LI Chaokui1, WANG Wei2.
Vector map data watermarking model controlling curve shape distortion
[J]. Computer Engineering and Applications, 2014, 50(1): 74-77.
|
[10] |
CHEN Shiwen, GUO Tong, HUANG Wanwei.
DDoS attack detection based on fast fractional Fourier transform
[J]. Computer Engineering and Applications, 2013, 49(24): 4-7.
|
[11] |
ZHAO Yong, XIONG Shunqing, YUAN Sha, XIA Wei, ZHOU Weihong.
Multiple transform domain watermarking algorithm based on NSCT decomposition DCT transform and SVD decomposition
[J]. Computer Engineering and Applications, 2013, 49(20): 167-170.
|
[12] |
LIN Kezheng, YAO Huan.
Digital image watermarking algorithm based on HCM and DT-CWT
[J]. Computer Engineering and Applications, 2013, 49(18): 167-170.
|
[13] |
ZHANG Fengmei, HAN Yadan, YAN Deqin.
Adaptive digital watermarking based on HVS and quantization
[J]. Computer Engineering and Applications, 2012, 48(34): 92-96.
|
[14] |
TAN Guolv.
Digital watermarking algorithm for PDF document
[J]. Computer Engineering and Applications, 2012, 48(32): 85-88.
|
[15] |
ZHANG Wenquan, XUE Xia, ZHOU Nanrun.
Multiple-image parallel encryption algorithm based on chaotic picture and phase retrieval
[J]. Computer Engineering and Applications, 2012, 48(23): 63-66.
|