共 50 条
- [31] Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
- [32] A Clairvoyant Approach to Evaluating Software (In)Security [J]. PROCEEDINGS OF THE 16TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS (HOTOS 2017), 2017, : 62 - 68
- [33] Research on Digital Watermarking Agent Based on Software Behavior [J]. MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 589 - +
- [34] Digital Audio Watermarking Techniques for the security of VOIP Communications [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (03): : 147 - 155
- [35] New VoIP traffic security scheme with digital watermarking [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2006, 4166 : 170 - 181
- [36] The Digital Watermarking Used to the Smart Power Grid Security [J]. ADVANCED MATERIALS SCIENCE AND TECHNOLOGY, PTS 1-2, 2011, 181-182 : 770 - +
- [37] Digital Watermarking Technology and Its Application in Information Security [J]. 2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 786 - 789
- [38] A Dynamic Security Model for Visual Cryptography and Digital Watermarking [J]. PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 351 - 357
- [39] Study of Digital Watermarking Techniques for Against Security Attacks [J]. INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 509 - 515
- [40] Digital Watermarking Security in the Printing and Scanning Process of Image [J]. DIGITAL FABRICATION 2011/ NIP27- 27TH INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES: TECHNICAL PROGRAMS AND PROCEEDINGS, 2011, 2011, : 263 - 266