[1] |
Weina DONG, Jia LIU, Xiaozhong PAN, Lifeng CHEN, Wenquan SUN.
High-capacity robust image steganography scheme based on encoding-decoding network
[J]. Journal of Computer Applications, 2024, 44(3): 772-779.
|
[2] |
Jie LIANG, Xiaoyan HAO, Yongle CHEN.
Poisoning attack toward visual classification model
[J]. Journal of Computer Applications, 2023, 43(2): 467-473.
|
[3] |
LIN Yangping, LIU Jia, CHEN Pei, ZHANG Mingshu, YANG Xiaoyuan.
Semi-generative video steganography scheme based on deep convolutional generative adversarial net
[J]. Journal of Computer Applications, 2023, 43(1): 169-175.
|
[4] |
REN Yiming, WANG Rangding, YAN Diqun, LIN Yuzhen.
Speech steganalysis method based on deep residual network
[J]. Journal of Computer Applications, 2021, 41(3): 774-779.
|
[5] |
CHEN Lang, WANG Rangding, YAN Diqun, LIN Yuzhen.
Audio steganography detection model combing residual network and extreme gradient boosting
[J]. Journal of Computer Applications, 2021, 41(2): 449-455.
|
[6] |
HUANG Siyuan, ZHANG Minqing, KE Yan, BI Xinliang.
Image steganalysis method based on saliency detection
[J]. Journal of Computer Applications, 2021, 41(2): 441-448.
|
[7] |
Jie WANG, Rangding WANG, Diqun YAN, Yuzhen LIN.
Detection method for echo hiding based on convolutional neural network framework
[J]. Journal of Computer Applications, 2020, 40(2): 375-380.
|
[8] |
BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong.
Information hiding algorithm based on fractal graph
[J]. Journal of Computer Applications, 2018, 38(8): 2306-2310.
|
[9] |
YANG Jie, LI Songbin, DENG Haojiang.
Steganalysis based on Bayesian network for compressed speech
[J]. Journal of Computer Applications, 2018, 38(7): 1967-1973.
|
[10] |
WANG Yaojie, NIU Ke, YANG Xiaoyuan.
Information hiding scheme based on generative adversarial network
[J]. Journal of Computer Applications, 2018, 38(10): 2923-2928.
|
[11] |
YANG Ming, HUANG Ying.
Diamond encoding steganography algorithm based on algebraic multigrid
[J]. Journal of Computer Applications, 2017, 37(6): 1609-1615.
|
[12] |
WANG Yujie, JIANG Weiwei.
Audio steganalysis method based on fuzzy C-means clustering and one class support vector machine
[J]. Journal of Computer Applications, 2016, 36(3): 647-652.
|
[13] |
XIONG Hao, REN Yanzhen, WANG Lina.
Universal steganalysis scheme of advanced audio coding
[J]. Journal of Computer Applications, 2016, 36(2): 382-386.
|
[14] |
KE Yan, ZHANG Minqing, LIU Jia.
Separable reversible Hexadecimal data hiding in encrypted domain
[J]. Journal of Computer Applications, 2016, 36(11): 3082-3087.
|
[15] |
XIANG Lingyun, WANG Xinhui.
Text steganographic method with hierarchical security
[J]. Journal of Computer Applications, 2015, 35(3): 717-721.
|