Wenxin Ma

Learn More
For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation(More)
Input-Predicate/Output (IP/O) n-chains coverage criterion, originally proposed for black-box testing of telecommunications software, is adapted to white-box testing of programs written in block-structured languages. This criterion is based on the analysis of the effects of inputs on predicates and outputs in a program. It requires that each such effect in a(More)
  • 1