[1] |
LI Guohe1,2, CHEN Chen1,2, WU Weijiang1,2, ZHENG Yifeng1,2, HONG Yunfeng3, ZHOU Xiaoming3.
Method of Imbedding and Extracting Watermark for Two-Dimensional Code Images
[J]. Computer Engineering and Applications, 2019, 55(10): 103-107.
|
[2] |
ZHAO Huanxi, CHU Xiaoyu.
Reconstruction of C1 blending interpolation spline surface based on cross-sectional data
[J]. Computer Engineering and Applications, 2018, 54(12): 165-169.
|
[3] |
DING Zhuihui.
Sonar signal identification method based on Discrete Cosine Transform
[J]. Computer Engineering and Applications, 2018, 54(1): 133-139.
|
[4] |
XU Jing1, HAN Jun2, TONG Zhigang1, WANG Yaxian2.
Method for detecting bird’s nest on tower based on UAV image
[J]. Computer Engineering and Applications, 2017, 53(6): 231-235.
|
[5] |
XUE Juntao, JIN Zhigang, YANG Zhengling, ZHANG Jun.
Analysis of watermarking model based on similarity of vectors
[J]. Computer Engineering and Applications, 2016, 52(24): 116-120.
|
[6] |
KANG Liangcheng, LI Chaofeng.
JPEG compressed image quality assessment method based on digital watermarking in contourlet domain
[J]. Computer Engineering and Applications, 2016, 52(21): 206-210.
|
[7] |
XIONG Luokai, CHEN Chao, XU Youjun.
Fast image collage technology based on graph cuts
[J]. Computer Engineering and Applications, 2016, 52(13): 218-221.
|
[8] |
JIANG Ce, PENG Jian, XIANG Lingyun, LI Feng.
Research on text reversible digital watermarking based on Hamming code
[J]. Computer Engineering and Applications, 2016, 52(11): 84-87.
|
[9] |
QIU Yimin1, ZHOU Yi2,3.
Wavelet transform?stereoscopic images enhancement algorithms based on?fog and haze
[J]. Computer Engineering and Applications, 2015, 51(9): 30-33.
|
[10] |
HUANG Dong, YANG Wan’an.
Robust digital watermarking by balancing feature points based on Harris-Laplacian
[J]. Computer Engineering and Applications, 2015, 51(7): 101-105.
|
[11] |
ZHAO Hongtu, LIU Yun.
Denoising algorithm of wavelet modulus maximum based on Blackman window interpolation
[J]. Computer Engineering and Applications, 2015, 51(13): 216-220.
|
[12] |
CHU Miao1, YU Suihuai1, TIAN Shaohui2, ZHOU Xian1.
Research on spatial color blending model for digital camouflage
[J]. Computer Engineering and Applications, 2014, 50(7): 175-179.
|
[13] |
FAN Zhiqiang.
Optimal design for multi-echelon coal supply chain network with complex demands
[J]. Computer Engineering and Applications, 2014, 50(5): 21-28.
|
[14] |
SUN Yunxiao1, WANG Xuewei1, WANG Xiaoying1, LI Shushang1, LI Leida1,2.
Image watermarking based on Jacobi-Fourier moment
[J]. Computer Engineering and Applications, 2014, 50(4): 94-97.
|
[15] |
WANG Jun, ZHENG Yong’an, SHI Zhongke.
Realization of high angle of attack simulation based on cylindrical projection system
[J]. Computer Engineering and Applications, 2014, 50(1): 260-266.
|