[1] |
Weina DONG, Jia LIU, Xiaozhong PAN, Lifeng CHEN, Wenquan SUN.
High-capacity robust image steganography scheme based on encoding-decoding network
[J]. Journal of Computer Applications, 2024, 44(3): 772-779.
|
[2] |
Zhenhao ZHAO, Shibin ZHANG, Wunan WAN, Jinquan ZHANG, zhi QIN.
Delegated proof of stake consensus algorithm based on reputation value and strong blind signature algorithm
[J]. Journal of Computer Applications, 2024, 44(12): 3717-3722.
|
[3] |
Pan YANG, Minqing ZHANG, Yu GE, Fuqiang DI, Yingnan ZHANG.
Color image information hiding algorithm based on style transfer process
[J]. Journal of Computer Applications, 2023, 43(6): 1730-1735.
|
[4] |
Chao LIN, Debiao HE, Xinyi HUANG.
Blockchain‑based electronic medical record secure sharing
[J]. Journal of Computer Applications, 2022, 42(11): 3465-3472.
|
[5] |
Hexiong CHEN, Yuwei LUO, Yunkai WEI, Wei GUO, Feilu HANG, Zhengxiong MAO, Zhenhong ZHANG, Yingjun HE, Zhenyu LUO, Linjiang XIE, Ning YANG.
Blockchain-based data frame security verification mechanism in software defined network
[J]. Journal of Computer Applications, 2022, 42(10): 3074-3083.
|
[6] |
YANG Longhai, WANG Xueyuan, JIANG Hesong.
Blockchain digital signature scheme with improved SM2 signature method
[J]. Journal of Computer Applications, 2021, 41(7): 1983-1988.
|
[7] |
GU Zhengchuan, GUO Yuanbo, FANG Chen.
End-to-end security solution for message queue telemetry transport protocol based on proxy re-encryption
[J]. Journal of Computer Applications, 2021, 41(5): 1378-1385.
|
[8] |
REN Shuai, XU Zhenchao, WANG Zhen, HE Yuan, ZHANG Tao, SU Dongxu, MU Dejun.
Low-density 3D model information hiding algorithm based on multple fusion states
[J]. Journal of Computer Applications, 2019, 39(4): 1100-1105.
|
[9] |
ZHANG Ru, HUANG Fuhong, LIU Jianyi, ZHU Feng.
Trojan implantation method based on information hiding
[J]. Journal of Computer Applications, 2018, 38(8): 2267-2273.
|
[10] |
BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong.
Information hiding algorithm based on fractal graph
[J]. Journal of Computer Applications, 2018, 38(8): 2306-2310.
|
[11] |
REN Shuai, ZHANG Tao, XU Zhenchao, WANG Zhen, HE Yuan, LIU Yunong.
Information hiding algorithm for 3D models based on feature point labeling and clustering
[J]. Journal of Computer Applications, 2018, 38(4): 1017-1022.
|
[12] |
ZHOU Zhicheng, LI Lixin, LI Zuohui.
Efficient cross-domain authentication scheme based on blockchain technology
[J]. Journal of Computer Applications, 2018, 38(2): 316-320.
|
[13] |
REN Shuai, ZHANG Tao, YANG Tao, SUO Li, MU Dejun.
Information hiding algorithm based on spherical segmentation of 3D model
[J]. Journal of Computer Applications, 2017, 37(9): 2576-2580.
|
[14] |
ZHANG Tao, KANG Yuan, REN Shuai, LIU Yunong.
Information hiding algorithm based on compression sensing and GHM multiwavelet transform
[J]. Journal of Computer Applications, 2017, 37(9): 2581-2584.
|
[15] |
REN Shuai, SUO Li, ZHANG Tao, YANG Tao, MU Dejun.
Information hiding algorithm based on 3D high efficiency video coding background
[J]. Journal of Computer Applications, 2017, 37(6): 1616-1619.
|