1.Information Sciences,A steganographic method based upon JPEG and particle swarm optimization algorithm,2007,Vol.177, No.15,3099-3109
2.系统工程与电子技术,一种基于k-Fibonacci矩阵和JPEG的数据隐藏方法,2006,Vol.28,No.8,1252-1257+1278
3.系统工程与电子技术,一种基于粒子群优化的信息隐藏方法,2007,Vol.29, No.4,655-658
4.系统工程与电子技术,一种抗RS攻击的隐秘算法,2007,Vol.29, No.8,1358-1361
5.计算机辅助设计与图像图形学学报,一种基于ICA的多边形曲线水印算法,2006,Vol.18, No.7,1054-1059
6.计算机辅助设计与图像图形学学报,一种HVS和Contourlet结合的图像水印算法,2007,Vol.19, No.6,811-816
7. Lecture Notes in Computer Science,Speaker Identification Using Reduced RBF Networks Array,2004,,924-929
8.Proceedings of International Ubiquitous Conference, An image watermark scheme based on NSCT and ICA,2008,,37-42
9.The 3rd International Joint Workshop on Information Security and Its Applications,Semi-fragile Watermarking for Image Authentication using Second Generation Curvelet Transform,2008,February 20-21,135-143
10.Information Sciences,Near-Optimal Solution to Pair-wise LSB Matching by Using Immune Programming Strategy