317 | -- | 319 | Shiguo Lian, Zhu Li, Stefanos Gritzalis, Xi Chen. Guest Editorial |
320 | -- | 328 | Baojiang Cui, Jun Guan, Tao Guo, Lifang Han, Jianxin Wang, Yupeng Ji. Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification |
329 | -- | 340 | Ying Zeng, Fenlin Liu, Xiangyang Luo, Chunfang Yang. Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis |
341 | -- | 348 | Cheng Guo, Zhi-Hui Wang, Chin-Chen Chang, Chuan Qin. A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction |
349 | -- | 358 | Yih-Chuan Lin, Tzung-Shian Li. Reversible Image Data Hiding Using Quad-tree Segmentation and Histogram Shifting |
359 | -- | 368 | N. Leelavathy, E. V. Prasad, S. Srinivas Kumar, B. Chandra Mohan. Oblivious Image Watermarking in Discrete Multiwavelet Domain using QIMM |
369 | -- | 375 | Xi Chen, Shiguo Lian. On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking |
376 | -- | 383 | Zhiyong Zhang, Tao Huang, Danmei Niu, Lili Zhang. Usage Control Model for Digital Rights Management in Digital Home Networks |
384 | -- | 391 | Wenjuan Chen, Guoyu Sun, Haiyan Li, Qingjie Sun, Minyong Shi. Caricature generation with different styles |