Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Scientiarum Naturalium Universitatis Sunyatseni
0529-6579
2004 Issue z2
Robust Image Watermarking Scheme and Its Application in MMS
liang hua qing ; chen xiu xin ; zhang li he ; wu hong tao ; yang cheng ; yang yi xian
..............page:124-127
Valid Digital Watermarking of Palette-based Image
yang cheng ; yang yi xian ; cai man chun
..............page:128-131
A Fast and Efficient Geometric Distortions Correction Algorithm for Image Digital Watermarking
yang xiao yuan ; ji cheng li ; wang yu min ; zhang min qing
..............page:120-123
A Video Watermarking Scheme Based on Motion Vectors
zhang gui dong ; mao yao bin ; wang zhi zuo
..............page:117-119
A Blind Watermarking Algorithm Based on SMVM
zhang guan nan ; wang shu xun ; cui li li
..............page:113-116
An Anonymous Fingerprinting Scheme Based on Homomorphic Public Key Cryptosystems
sun zhong wei ; feng deng guo
..............page:109-112
Different Level Security of Information Hiding
guo yan qing ; he de quan ; you xin gang ; kong xiang wei
..............page:105-108
Analysis of the Attack and Defend in Digital Watermarking
sun shui fa ; chou pei liang ; zhang hua xiong
..............page:94-97
The New Results of the Codes Having Traceability in Fingerprinting
cai qing jun ; pei ding yi
..............page:98-100
Research and Realization of Echo Data Hiding
yang yu ; bai jian ; xu ying zuo ; niu xin xin ; yang yi xian
..............page:50-52
A Robust Watermarking Scheme Based on SVD and ICA
li hai feng ; wang shu xun ; wen quan ; song wei wei
..............page:53-57
Image Scrambling Degree Evaluation Method Based on Walsh Transformation
bai sen ; liao xiao feng
..............page:58-61
Steganalysis Based on Contamination Data Analysis
guan wei ; zhang wei ming ; liu wen fen
..............page:62-65,70
A Universal Blind Steganalysis Based on Principal Component Analysis and RBF Network
chen dan ; zhang jian hong ; wang yu min
..............page:66-70
The Overview of Binary Image Information Hiding
zhou lin na ; yang yi xian ; guo yun biao ; hu zuo
..............page:71-75
A Figure Spectrum Estimate Method to Steganography Software in Images
liu zhen hua ; di wei dong ; lv shu wang ; chen qing yuan
..............page:76-78,82
Digital Copyright Protection Security Schemes Against Protocol Attacks
liu li gang ; chen xiao su ; hu lei
..............page:83-86
Security of Steganography Based on Space of Redundancy Data
song hui ; kong xiang wei ; you xin gang ; hu zuo
..............page:87-90
Authentication Scheme for Copyright Protection of Digital Product
cheng wei dong ; liu hong mei
..............page:91-93
A New Image Encryption Algorithm Based on Chaotic Map
xiong chang zhen ; zou jian cheng ; qi dong xu
..............page:29-33
The Models of Closing the Subliminal Channels
li shu hai ; wang yu min
..............page:34-37
An Entropy Model Based on LSB Substitution and MSB Substitution
xiao hong hua ; huang yong feng ; zhu ming fang
..............page:42-45
An Adaptive Quantization Speech Camouflage Algorithm Based on F-norm in Wavelet Domain
chen liang ; liu shi ; li yun jian
..............page:46-49
A New Verifiable Ring Signature Scheme
gan zhi ; chen ke fei
..............page:132-134
Analysis and Research of Grid Security Based on Knowledge Base
xiao hai dong ; li jian hua ; jiang xing hao ; chen li ya
..............page:135-138
On the Periods of Arnold Transformations and Some Applications
li bing ; xu jia wei
..............page:139-142
Fibonacci Transformation and Its Applications in Digital Image Watermark
shang yan hong ; li nan ; zou jian cheng
..............page:148-151,155
Statistical Security Comparison of Steganographic Algorithm on GIF Images
ding zuo ; kong xiang wei ; you xin gang ; hu zuo
..............page:152-155
An Audio Hiding Algorithm on GSM Mobile Communication System
bai jian ; yang yu ; xu ying zuo ; niu xin xin ; yang yi xian
..............page:156-159
Robustness Investigation of Digital Watermarking Algorithm for Print-and-Scan Process
niu shao zhang ; wu hong tao ; xie zheng cheng ; liu zuo ; yang yi xian
..............page:1-4
Studying RS Steganalysis and a Steganographic Algorithm which Can Resist this Steganalysis
lv shu wang ; chen qing yuan ; liu zhen hua ; di wei dong
..............page:5-9
Secure Watermarking System Capable of Resisting Invertibility and Inserter Attacks
zhang xin peng ; wang shuo zhong
..............page:10-13
The Security of Generalized Information Hiding
lin dai mao ; hu zuo ; guo yun biao ; zhou lin na
..............page:14-16
Image Steganalysis Based on Bit-Plane Statistical Correlation Using Support Vector Machine
he jun hui ; liang xiao ping ; li jian qian ; huang ji wu
..............page:17-20
Information Hiding Technique Based on 2D Barcode
niu xia mu ; huang wen jun ; wu di ; zhang hui
..............page:21-25
Audio Watermarking Based on Partial MP3 Encoding
liu wei ; wang shuo zhong ; zhang xin peng
..............page:26-28,33
A Reliable Detection of LSB Steganography Based on Histogram Difference Separation
liu guang jie ; dai yue wei ; wang zhi zuo
..............page:213-216
A Research on Security of Matrix LSB Steganography
fu hai yan ; kong xiang wei ; you xin gang ; hu zuo
..............page:217-220
MP3Stego Hiding and Detecting Research
song hua ; xing qiu lin ; li wei qi ; dai yi qi
..............page:221-224
The Application of Semi-fragile Digital Watermark Technology in the MPEG
wang lei ; wang dao xian ; duan xiao hui
..............page:169-171,175
Hierarchical Access Control for Secure Group Communication
su ming ; liu gang
..............page:172-175
Attack on Binary Image Information Hiding
guo yun biao ; hu zuo ; you xin gang ; zhang chun tian
..............page:176-179
Research on CDMA Digital Watermarking Based on Multiwavelet Transform
zhu yan ; feng deng guo ; yang yong tian
..............page:180-183
Model-based Steganalysis
yu xiao yi ; tan tie niu ; wang yun hong
..............page:184-187,191
Blind Audio Authentication Algorithm Based on SVD and Amalgamation
wang zuo ; bai sen ; zhao bo
..............page:188-191
An MPEG-4 Motion Vector Watermarking Scheme Based on Scrambling Using Game of Life
dai zuo zuo ; huang wen yong ; chen zhen yong ; tang long
..............page:192-195
Reversible Data Hiding Based on Integer Wavelet
yang cheng yun ; xuan guo rong ; shi yun qing ; zheng yi zhan ; zheng jun xiang ; liu lian sheng ; bai wei chao
..............page:196-199
Research on Watermark Signal of Public-key Digital Watermarking Scheme
hu yan jun ; ma xiao ping ; chen ying ; gao li
..............page:200-203,208
Adaptive Audio Digital Watermark Algorithm Based on Psychoacoustic Auditory Model
li yun jian ; chen liang ; zhang xiong wei
..............page:204-208
A Video Resynchronization Algorithm Based on Information Hiding
su yu ting ; zhang chun tian
..............page:209-212
Public Digital Watermark Using Error Correcting Code
yang qing ; chen ke fei
..............page:160-163
Analysis of Steganographic Capacity under the Limit of Security
cao jia ; liu wen fen ; zhang wei ming
..............page:164-168