共 50 条
- [22] Multiple access method based on complete complementary codes in ultra wideband wireless communication Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2005, 28 (06): : 65 - 68
- [23] On the Host Signal Approximation for Image Data Hiding Scheme Based on Complete Complementary Codes 2017 EIGHTH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2017, : 135 - 139
- [24] A Disaster Prevention Broadcasting Based on Data Hiding Scheme Using Complete Complementary Codes 2014 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA), 2014, : 45 - 49
- [25] Attacking digital watermarks SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VI, 2004, 5306 : 848 - 858
- [26] Attacks on digital watermarks Conference Record of the Asilomar Conference on Signals, Systems and Computers, 1999, 2 : 1508 - 1512
- [27] Watermarks and cryptography based model for digital rights management Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2006, 29 (05): : 98 - 102
- [28] Complete complementary codes applied to UTRA FDD asynchronous uplink MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 441 - 444
- [29] Two-dimensional quasi orthogonal complete complementary codes SYMPOTIC'03: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2003, : 37 - 40