Advanced Search



9 results found in all.
index Title
1Robust lossless data hiding scheme
Author(s):Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI  Clicked:11761  Download:7692  Cited:3  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.2 P.101-110  DOI:10.1631/jzus.C0910177
2An error resilient scheme for H.264 video coding based on distortion estimated mode decision and nearest neighbor error concealment
Author(s):Lee Tien-Hsu, Wang Jong-Tzy, Chen Jhih-Bin, Chang Pao-Chi  Clicked:5689  Download:2548  Cited:0  <Full Text>
Journal of Zhejiang University Science A  2006 Vol.7 No.100 P.34-40  DOI:10.1631/jzus.2006.AS0034
3High-payload completely reversible data hiding in encrypted images by an interpolation technique
Author(s):Di Xiao, Ying Wang, Tao Xiang, Sen Bai  Clicked:11044  Download:4618  Cited:0  <Full Text>  <PPT> 2423
Frontiers of Information Technology & Electronic Engineering  2017 Vol.18 No.11 P.1732-1743  DOI:10.1631/FITEE.1601067
4A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
Author(s):Muhammad Imran, Bruce A. Harvey, Muhammad Atif, Adnan Ali Memon  Clicked:8545  Download:3617  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2019 Vol.20 No.7 P.946-963  DOI:10.1631/FITEE.1700667
5High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction
Author(s):Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG  Clicked:3470  Download:12952  Cited:0  <Full Text>  <PPT> 926
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1156-1168  DOI:10.1631/FITEE.2200501
6Reversible data hiding using a transformer predictor and an adaptive embedding strategy
Author(s):Linna ZHOU, Zhigao LU, Weike YOU, Xiaofei FANG  Clicked:3532  Download:6441  Cited:0  <Full Text>  <PPT> 990
Frontiers of Information Technology & Electronic Engineering  2023 Vol.24 No.8 P.1143-1155  DOI:10.1631/FITEE.2300041
7Reversible data hiding scheme for encrypted JPEG bitstreams using adaptive RZL rotation
Author(s):Yongning GUO, Guodong SU, Zhiqiang YAO, Wang ZHOU  Clicked:2988  Download:2101  Cited:0  <Full Text>  <PPT> 740
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.10 P.1353-1369  DOI:10.1631/FITEE.2300749
8Reversible data hiding in encrypted images based on additive secret sharing and additive joint coding using an intelligent predictor
Author(s):Ziyi ZHOU, Chengyue WANG, Kexun YAN, Hui SHI, Xin PANG  Clicked:3330  Download:2282  Cited:0  <Full Text>  <PPT> 683
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.9 P.1250-1265  DOI:10.1631/FITEE.2300750
9SCFformer: a binary data hiding method against JPEG compression based on spatial channel fusion Transformer
Author(s):Xintao DUAN, Chun LI, Bingxin WEI, Guoming WU, Chuan QIN, Haewoon NAM  Clicked:3107  Download:3478  Cited:0  <Full Text>  <PPT> 554
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.5 P.728-741  DOI:10.1631/FITEE.2300762
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE