[1] |
REN Shuai, WANG Zhen, XU Zhen-chao, SU Dong-xu, HE Yuan.
Information Hiding Scheme Based on Texture Mapping of 3D Model in OBJ Format
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(1): 22-27.
|
[2] |
XUE Yi-ming, HE Ning-ning, CHEN Yao, HU Cai-e, NIU Shao-zhang.
Speech Hiding Algorithm Based on Mobile Circuit-Switched Domain
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(6): 57-64.
|
[3] |
WANG Ying-ying, YANG Cheng-song, ZHU Chang-qing, REN Na, FANG Hu-sheng.
Digital Watermarking Against Data Merging Attack for Vector Geographic Data
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2017, 40(4): 48-53.
|
[4] |
ZHAO Jian, HAN Fan, JIA Jian, LIU Shan, XU Wen-sheng.
Two-Stage Extended Discrete Shearlet Transform of Digital Watermarking Algorithm
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 19-22.
|
[5] |
BAI Jian, CAO Peng.
Capacity Estimation Research for Speech Information Hiding
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(s1): 76-80.
|
[6] |
ZHANG Shuai, WANG Peng, SUN Yan.
Adaptive Model of Information Hiding for the Same Type
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(4): 35-39.
|
[7] |
.
A Construction of Digital Watermarking Model for the Vector Geospatial Data Based on Magnitude and Phase of DFT
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 25-28.
|
[8] |
.
Information Hiding Technology of KML File
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(1): 140-144.
|
[9] |
.
An Authentication Watermarking Technique for Binary Images
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(5): 66-69.
|
[10] |
YE Tian-yu, NIU Xin-xin, YANG Yi-xian.
Analysis on the Performances of Information Hiding System under Passive Attack
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 46-49.
|
[11] |
JIANG Nan,WANG Jian,YANG Yixian.
A New Method for Blind Image Steganalysis
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(2): 1-4.
|
[12] |
LIN Dai-mao, HU Lan, GUO Yun-biao, ZHOU Lin-na.
The Mechanism and Model of Generalized Information Hiding Technology
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2005, 28(1): 1-5.
|
[13] |
YUAN Zhong-lan, XIA Guang-sheng, WEN Qiao-yan, YANG Yi-xian.
Copyright Protection Protocol for Digital Media
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2005, 28(1): 19-22.
|
[14] |
N IU Shao-zhang , GUO Fen-hong , N IU Xin-xin
.
Digital Watermarking Algorithm Based on Diagonally Dominant Matrix
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2004, 27(6): 74-78.
|
[15] |
XIA Guang-sheng, YUAN Zhong-lan, YANG Yi-xian, HU Zheng-ming.
A New Visual Cryptography Algorithm to Hide a Two-ColorImagein a Single Shared Image
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2002, 25(3): 12-16.
|