[1] |
Qingyu YUAN, Tiegang GAO.
Reversible information hiding based on pixel prediction and secret image sharing
[J]. Journal of Computer Applications, 2024, 44(3): 780-787.
|
[2] |
Xiangyu ZHANG, Yang YANG, Guohui FENG, Chuan QIN.
Reversible data hiding in encrypted image based on multi-objective optimization
[J]. Journal of Computer Applications, 2022, 42(6): 1716-1723.
|
[3] |
Yuan GUO, Xuewen WANG, Chong WANG, Jinlin JIANG.
Nonlinear scrambling diffusion synchronization image encryption based on dynamic network
[J]. Journal of Computer Applications, 2022, 42(1): 162-170.
|
[4] |
LI Shanshan, ZHAO Li, ZHANG Hongli.
Image grey level encryption based on cat map
[J]. Journal of Computer Applications, 2021, 41(4): 1148-1152.
|
[5] |
SHEN Ziyi, WANG Weiya, JIANG Donghua, RONG Xianwei.
Visual image encryption algorithm based on Hopfield chaotic neural network and compressive sensing
[J]. Journal of Computer Applications, 2021, 41(10): 2893-2899.
|
[6] |
CHEN Tian, ZUO Yongsheng, AN Xin, REN Fuji.
Test data compatible compression method based on tri-state signal
[J]. Journal of Computer Applications, 2019, 39(6): 1863-1868.
|
[7] |
GE Jiangxia, QI Wentao, LAN Lin, TIAN Yu, ZHU Hegui.
Two-dimensional inverse-trigonometric hyperchaotic system and its application in image encryption
[J]. Journal of Computer Applications, 2019, 39(1): 239-244.
|
[8] |
XIE Xiaojun, YU Hao, TAO Lei, ZHANG Xinming.
Data gathering optimization based on dynamic data compression in energy harvesting wireless sensor network
[J]. Journal of Computer Applications, 2018, 38(8): 2353-2358.
|
[9] |
ZHANG Jiachen, LIU Xiaoguang, WANG Gang.
Cache optimization for compressed databases in various storage environments
[J]. Journal of Computer Applications, 2018, 38(5): 1404-1409.
|
[10] |
WEI Wei, DUAN Xiaodong, LIU Yongkui, GUO Chen.
A new compressed vertex chain code
[J]. Journal of Computer Applications, 2017, 37(6): 1747-1752.
|
[11] |
MA Zhiqiang, LI Haisheng.
Fast and effective compression for 3D dynamic scene based on KD-tree division
[J]. Journal of Computer Applications, 2016, 36(9): 2590-2596.
|
[12] |
JIN Jianguo, XIAO Ying, DI Zhigang.
Image encryption based on chaotic dynamic random grouping and modulating fractional Fourier transform rotation factor
[J]. Journal of Computer Applications, 2016, 36(4): 966-972.
|
[13] |
LIU Leijun, FANG Cheng, ZHANG Lei, BAO Suning.
Online compression of global positioning system trajectory data based on motion state change
[J]. Journal of Computer Applications, 2016, 36(1): 122-127.
|
[14] |
DING Xinzhe, ZHANG Zhaogong, LI Jianzhong, TAN Long, LIU Yong.
Relational algebraic operation algorithm on compressed data
[J]. Journal of Computer Applications, 2016, 36(1): 21-26.
|
[15] |
CHEN Meng, YU Xiaohui, LIU Yang.
Mining mobility patterns based on deep representation model
[J]. Journal of Computer Applications, 2016, 36(1): 33-38.
|