相似文献/References:
[1]李兵兵 王衍波 徐敏 周杰.一种Word 2007中可无源检测的信息隐藏方法[J].计算机技术与发展,2010,(05):154.
LI Bing-bing,WANG Yan-bo,XU Min,et al.An Information Hiding Method with "Blind" Detection Based on Word 2007[J].,2010,(09):154.
[2]吕建勋 贾世杰.基于图像的数字水印技术[J].计算机技术与发展,2009,(02):173.
LU Jian-xun,JIA Shi-jie.Digital Watermark Technologies Based on Images[J].,2009,(09):173.
[3]朴红吉 郑品 田雄 冯林.基于线性预测和位操作的信息隐藏算法[J].计算机技术与发展,2008,(01):185.
PIAO Hong-ji,ZHENG Pin,TIAN Xiong,et al.Data Hiding Algorithm Based on Linear- Prediction and Bit - Operation[J].,2008,(09):185.
[4]由守杰 柏森 曾辉[].鲁棒的混合域音频信息隐藏算法[J].计算机技术与发展,2008,(03):169.
YOU Shou-jie,BAI Sen,ZENG Hui.Robust Audio Information Hiding Algorithm Based on DWT and DCT[J].,2008,(09):169.
[5]陆绿 方勇.基于字符Unicode奇偶性的数字水印设计与实现[J].计算机技术与发展,2010,(08):176.
LU Lu,FANG Yong.Design and Implementation of Digital Watermark Based on Parity of Unicode[J].,2010,(09):176.
[6]陈芳 王冰.基于文本字体的信息隐藏算法[J].计算机技术与发展,2006,(01):20.
CHEN Fang,WANG Bing.An Algorithm of Text Information Hiding Based on Font[J].,2006,(09):20.
[7]周化灵 陈春玲.基于N阶Bézier曲线的多信息隐藏算法研究[J].计算机技术与发展,2006,(05):85.
ZHOU Hua-ling,CHEN Chun-ling.Research on Multi- Information Concealment Algorithm Based on N -Bézier Curve[J].,2006,(09):85.
[8]商金婷 侯德文.基于策略模式的信息隐藏处理的软构件[J].计算机技术与发展,2006,(07):132.
SHANG Jin-ting,HOU De-wen.A Soft Component of Information Hiding Based on Strategy Model[J].,2006,(09):132.
[9]李向辉 钟诚.提高Word文本文档信息隐藏容量的方法研究[J].计算机技术与发展,2006,(09):97.
LI Xiang-hui,ZHONG Cheng.Research on Improving Capacity for Word Information Hiding Text Document[J].,2006,(09):97.
[10]李鹏 王汝传.内核入侵隐藏技术的研究与实现[J].计算机技术与发展,2011,(03):170.
LI Peng,WANG Ru-chuan.Research and Realization of Concealment Technology Based on Kernel Hacking[J].,2011,(09):170.