Advanced Search



15 results found in all.
index Title
1Multipurpose audio watermarking algorithm
Author(s):Ning CHEN, Jie ZHU  Clicked:7394  Download:4013  Cited:5  <Full Text>
Journal of Zhejiang University Science A  2008 Vol.9 No.4 P.517-523  DOI:10.1631/jzus.A071493
2Watermarking on 3D mesh based on spherical wavelet transform
Author(s):JIN Jian-qiu, DAI Min-ya, BAO Hu-jun, PENG Qun-sheng  Clicked:7798  Download:4035  Cited:8  <Full Text>
Journal of Zhejiang University Science  2004 Vol.5 No.3 P.251-258  DOI:10.1631/jzus.2004.0251
3A new asymmetric watermarking scheme based on a real fractional DCT-I transform
Author(s):Gui Guo-fu, Jiang Ling-ge, He Chen  Clicked:7365  Download:3204  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.3 P.285-288  DOI:10.1631/jzus.2006.A0285
4Adaptive audio watermarking based on SNR in localized regions
Author(s):WU Guo-min, ZHUANG Yue-ting, WU Fei, PAN Yun-he  Clicked:5205  Download:3092  Cited:1  <Full Text>
Journal of Zhejiang University Science A  2005 Vol.6 No.100 P.53-57  DOI:10.1631/jzus.2005.AS0053
5A multipurpose audio watermarking algorithm with synchronization and encryption
Author(s):Baiying Lei, Ing Yann Soon  Clicked:10880  Download:5379  Cited:4  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.1 P.11-19  DOI:10.1631/jzus.C1100085
6A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique
Author(s):Hong-yuan Chen, Yue-sheng Zhu  Clicked:12429  Download:5709  Cited:10  <Full Text>
Journal of Zhejiang University Science C  2012 Vol.13 No.8 P.573-584  DOI:10.1631/jzus.C1100338
7A blind watermarking algorithm for 3D mesh models based on vertex curvature
Author(s):Yong-zhao Zhan, Yan-ting Li, Xin-yu Wang, Yi Qian  Clicked:11523  Download:8770  Cited:17  <Full Text>  <PPT> 2644
Journal of Zhejiang University Science C  2014 Vol.15 No.5 P.351-362  DOI:10.1631/jzus.C1300306
8A robust intelligent audio watermarking scheme using support vector machine
Author(s):Mohammad Mosleh, Hadi Latifpour, Mohammad Kheyrandish, Mahdi Mosleh, Najmeh Hosseinpour  Clicked:10714  Download:4511  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2016 Vol.17 No.12 P.1320-1330  DOI:10.1631/FITEE.1500297
9A subband excitation substitute based scheme for narrowband speech watermarking
Author(s):Wei Liu, Ai-qun Hu  Clicked:8951  Download:3981  Cited:0  <Full Text>  <PPT> 2644
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.5 P.627-643  DOI:10.1631/FITEE.1601503
10On the role of optimization algorithms in ownership-preserving data mining
Author(s):Muhammad Kamran, Ehsan Ullah Munir  Clicked:9135  Download:3519  Cited:0  <Full Text>  <PPT> 2135
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.2 P.151-164  DOI:10.1631/FITEE.1601479
11A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
Author(s):Muhammad Imran, Bruce A. Harvey, Muhammad Atif, Adnan Ali Memon  Clicked:8741  Download:3954  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.946-963  DOI:10.1631/FITEE.1700667
12Discrete fractional watermark technique
Author(s):Zai-rong Wang, Babak Shiri, Dumitru Baleanu  Clicked:7648  Download:7172  Cited:0  <Full Text>  <PPT> 2349
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.6 P.880-883  DOI:10.1631/FITEE.2000133
13A robust tensor watermarking algorithm for diffusion-tensor images
Author(s):Chengmeng LIU, Zhi LI, Guomei WANG, Long ZHENG  Clicked:3859  Download:4037  Cited:0  <Full Text>  <PPT> 468
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.3 P.384-397  DOI:10.1631/FITEE.2200628
14A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Author(s):Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE  Clicked:4460  Download:10565  Cited:0  <Full Text>  <PPT> 1096
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.7 P.1045-1061  DOI:10.1631/FITEE.2200372
15Full-defense framework: multi-level deepfake detection and source tracing
Author(s):Hui SHI, Guibin WANG, Yanni LI, Rujia QI  Clicked:1544  Download:2760  Cited:0  <Full Text>  <PPT> 311
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1649-1661  DOI:10.1631/FITEE.2401012
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE