Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (8): 33-37    DOI:
Current Issue | Archive | Adv Search |
The DigitalWatermarking Based on Shearlet Transform and the Information Security
Guo Junfeng1,Li Jing2,Wu Xinhui2
1. Department of Public Security of Anyang City 2. Anyang Institute of Technology
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Published: 08 November 2017
:  TP309.7  

Cite this article:

Guo Junfeng, Li Jing, Wu Xinhui. The DigitalWatermarking Based on Shearlet Transform and the Information Security. Computer & Telecommunication, 2015, 1(8): 33-37.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I8/33

[1] Ge Lan. The Principle and Implementation of Vigenere Encryption Algorithm[J]. 电脑与电信, 2017, 1(4): 64-65.
[2] Zhang Bo, Wang Yuxin, Li Tianying, Yang Shuguo. Watermark Algorithm in DWT Domain Based on Fractal Theory and HVS[J]. 电脑与电信, 2016, 1(7): 5-8.
[3] Zhang Qi, Li Hao. Research on the Algorithm of Semi Fragile DigitalWatermarking Based on DCT conversion[J]. 电脑与电信, 2015, 1(8): 30-32.
[4] Zou Yi, Li Lang. Design of the“Encryption Course”Teaching System[J]. 电脑与电信, 2015, 1(1-2): 35-36.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd