[1] |
Weina DONG, Jia LIU, Xiaozhong PAN, Lifeng CHEN, Wenquan SUN.
High-capacity robust image steganography scheme based on encoding-decoding network
[J]. Journal of Computer Applications, 2024, 44(3): 772-779.
|
[2] |
Pan YANG, Minqing ZHANG, Yu GE, Fuqiang DI, Yingnan ZHANG.
Color image information hiding algorithm based on style transfer process
[J]. Journal of Computer Applications, 2023, 43(6): 1730-1735.
|
[3] |
REN Shuai, XU Zhenchao, WANG Zhen, HE Yuan, ZHANG Tao, SU Dongxu, MU Dejun.
Low-density 3D model information hiding algorithm based on multple fusion states
[J]. Journal of Computer Applications, 2019, 39(4): 1100-1105.
|
[4] |
ZHANG Ru, HUANG Fuhong, LIU Jianyi, ZHU Feng.
Trojan implantation method based on information hiding
[J]. Journal of Computer Applications, 2018, 38(8): 2267-2273.
|
[5] |
BAI Sen, ZHOU Longhu, YANG Yi, LI Jing, JI Xiaoyong.
Information hiding algorithm based on fractal graph
[J]. Journal of Computer Applications, 2018, 38(8): 2306-2310.
|
[6] |
REN Shuai, ZHANG Tao, XU Zhenchao, WANG Zhen, HE Yuan, LIU Yunong.
Information hiding algorithm for 3D models based on feature point labeling and clustering
[J]. Journal of Computer Applications, 2018, 38(4): 1017-1022.
|
[7] |
REN Shuai, ZHANG Tao, YANG Tao, SUO Li, MU Dejun.
Information hiding algorithm based on spherical segmentation of 3D model
[J]. Journal of Computer Applications, 2017, 37(9): 2576-2580.
|
[8] |
ZHANG Tao, KANG Yuan, REN Shuai, LIU Yunong.
Information hiding algorithm based on compression sensing and GHM multiwavelet transform
[J]. Journal of Computer Applications, 2017, 37(9): 2581-2584.
|
[9] |
REN Shuai, SUO Li, ZHANG Tao, YANG Tao, MU Dejun.
Information hiding algorithm based on 3D high efficiency video coding background
[J]. Journal of Computer Applications, 2017, 37(6): 1616-1619.
|
[10] |
CHEN Yongna, ZHOU Yu, WANG Xiaodong, GUO Lei.
Video information hiding algorithm based on diamond coding
[J]. Journal of Computer Applications, 2017, 37(10): 2806-2812.
|
[11] |
GAO Bin, ZHAI Jiangtao, DAI Yuewei.
Information hiding method based on Have messages in BitTorrent protocol
[J]. Journal of Computer Applications, 2017, 37(1): 200-205.
|
[12] |
REN Shuai, SHI Fangxia, ZHANG Tao.
Information hiding scheme for 3D model based on profile analysis
[J]. Journal of Computer Applications, 2016, 36(3): 642-646.
|
[13] |
KE Yan, ZHANG Minqing, LIU Jia, YANG Xiaoyuan.
Overview on reversible data hiding in encrypted domain
[J]. Journal of Computer Applications, 2016, 36(11): 3067-3076.
|
[14] |
REN Fang, ZHENG Dong.
Robust image information hiding algorithm based on error correcting codes
[J]. Journal of Computer Applications, 2015, 35(7): 1903-1907.
|
[15] |
WU Penghui, YANG Bailong, ZHAO Wenqiang, GUO Wenpu.
Audio watermarking scheme based on empirical mode decomposition
[J]. Journal of Computer Applications, 2015, 35(5): 1417-1420.
|