[1] |
TIAN Huiming1, WU Chengmao2, TIAN Xiaoping2.
Reversible Information Hiding Based on Chaotic Theory and Integer Transformation
[J]. Computer Engineering and Applications, 2019, 55(12): 194-201.
|
[2] |
LI Guohe1,2, CHEN Chen1,2, WU Weijiang1,2, ZHENG Yifeng1,2, HONG Yunfeng3, ZHOU Xiaoming3.
Method of Imbedding and Extracting Watermark for Two-Dimensional Code Images
[J]. Computer Engineering and Applications, 2019, 55(10): 103-107.
|
[3] |
WANG Yongchao, LU Mingming.
Research and implementation of big data migration for financial industry
[J]. Computer Engineering and Applications, 2018, 54(13): 93-99.
|
[4] |
DING Zhuihui.
Sonar signal identification method based on Discrete Cosine Transform
[J]. Computer Engineering and Applications, 2018, 54(1): 133-139.
|
[5] |
XUE Juntao, JIN Zhigang, YANG Zhengling, ZHANG Jun.
Analysis of watermarking model based on similarity of vectors
[J]. Computer Engineering and Applications, 2016, 52(24): 116-120.
|
[6] |
KANG Liangcheng, LI Chaofeng.
JPEG compressed image quality assessment method based on digital watermarking in contourlet domain
[J]. Computer Engineering and Applications, 2016, 52(21): 206-210.
|
[7] |
JIANG Ce, PENG Jian, XIANG Lingyun, LI Feng.
Research on text reversible digital watermarking based on Hamming code
[J]. Computer Engineering and Applications, 2016, 52(11): 84-87.
|
[8] |
HUANG Dong, YANG Wan’an.
Robust digital watermarking by balancing feature points based on Harris-Laplacian
[J]. Computer Engineering and Applications, 2015, 51(7): 101-105.
|
[9] |
AN Qiusheng1, KONG Xiangyu2, SU Qin1.
Mathematical foundation of rough relational database
[J]. Computer Engineering and Applications, 2015, 51(14): 108-112.
|
[10] |
SUN Yunxiao1, WANG Xuewei1, WANG Xiaoying1, LI Shushang1, LI Leida1,2.
Image watermarking based on Jacobi-Fourier moment
[J]. Computer Engineering and Applications, 2014, 50(4): 94-97.
|
[11] |
WU Baiyan1, LI Chaokui1, WANG Wei2.
Vector map data watermarking model controlling curve shape distortion
[J]. Computer Engineering and Applications, 2014, 50(1): 74-77.
|
[12] |
HU Junfeng, CAO Jun.
Robustness watermark algorithm based on directional wavelet and Slant transform
[J]. Computer Engineering and Applications, 2013, 49(6): 91-96.
|
[13] |
WANG Jijun.
Algorithm for reversible watermarking based on location map
[J]. Computer Engineering and Applications, 2013, 49(4): 87-90.
|
[14] |
ZHAO Yong, XIONG Shunqing, YUAN Sha, XIA Wei, ZHOU Weihong.
Multiple transform domain watermarking algorithm based on NSCT decomposition DCT transform and SVD decomposition
[J]. Computer Engineering and Applications, 2013, 49(20): 167-170.
|
[15] |
LIN Kezheng, YAO Huan.
Digital image watermarking algorithm based on HCM and DT-CWT
[J]. Computer Engineering and Applications, 2013, 49(18): 167-170.
|