JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (9): 68-75.doi: 10.6040/j.issn.1671-9352.3.2015.069
Previous Articles Next Articles
MAO Jia-fa1,2,3, HUANG Yan-hong1, NIU Xin-xin2, XIAO Gang1, 3, ZHU Li-nan1, SHENG Wei-guo1,3
CLC Number:
[1] 董秀则,张茹,钮心忻. MB隐写分析算法[J]. 北京邮电大学学报,2012,02:99-103. DONG Xiuze, ZHANG Ru, NIU Xinxin. A steganalysis algorithm on MB stegano-graphy[J].Journal of Beijing University of Posts and Telecommunications, 2012, 02:99-103. [2] 高虎明,李凯捷,王英娟.基于SIFT 抗几何攻击的数字水印算法[J]. 计算机应用,2013,33(3):748-751. GAO Huming, LI Kaijie, WANG Yingjuan. A digital watermarking algorithm based on SIFT against geometric attacks [J]. Journal of Computer Applications, 2013, 33(3):748-751. [3] 武嘉,张茹,钮心忻,等. 针对BPCS隐写的隐写分析法[J]. 北京邮电大学学报,2009,04:113-116. WU Jia, ZHANG Ru, NIU Xinxin, et al. Reliable detection of BPCS stega-nography [J]. Journal of Beijing University of Posts and Telecommunications, 2009, 04:113-116. [4] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学(E集:信息科学), 2007, 37(2):129-150. SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et al. Information security review [J]. Science in China(Series E: Information Sciences), 2007, 37(2):129-150. [5] VORBRUGGEN J C, CAYRE F. The Certimark benchmark: architecture and future perspectives[C] //Proceeding of the IEEE International Conference on Multimedia and Expo(ICME2002).New York: IEEE, 2002:485-488. [6] KIM H C, LIN E T, GUITART O, et al. Further progress in watermark evaluation testbed(WET)[C] //Proceedings of the SPIE International Conference on Security and Watermarking of Multimedia Contents(SPIE2005). USA: SPIE, 2005:236-247. [7] SOLACHIDIS V, TEFAS A, NIKOLAIDIS N, et al. A benchmarking protocol for water-marking methods[C] //Proceedings of International Conference on Image Processing. New York: IEEE, 2001, 3:1023-1026. [8] MOULIN P, OSULLIVAN J A. Information theoretic analysis of information hiding [J]. IEEE Transactions on Information Theory, 2003, 49(3):563-593. [9] COHEN A, LAPIDOTH A. The Gaussian watermarking game[J]. IEEE Transactions on Information Theory, 2002, 48(6):1639-1667. [10] SOMEKH-BARUCH A, MERHAV N. On the capacity game of public watermarking system[J]. IEEE Transactions on Infor-mation Theory, 2004, 50(3):511-524. [11] SAJEDI H, JAMZAD M. Secure steganography based on embedding capacity[J]. International Journal of Information Security, 2009, 8(6):433-445. [12] 高海英. 音频信息隐藏理论及应用[D]. 北京: 北京邮电大学,2006. GAO Haiying. The theory and application of audio information hiding [D]. Beijing: Beijing University of Posts and Telecommunicatons, 2006. [13] COHEN A S, LAPIDOTH A. The capacity of the vector Gaussian watermarking game[C] //Proceeding of the IEEE International Symposium on Information Theory(ISIT2001). Piscataway: IEEE, 2001: 24-29. [14] ZHANG X, WANG S. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Processing Letters, 2005, 12(1):67-70. [15] MAO J F, NIU X X, YANG Y X, et al. JPEG2000 image maximum steganogra-phy payload based on MPUI model [J].Journal of Software, 2014, 25(7):1606-1620. [16] FILLER T, JUDAS J, FRIDRICH J. Gibbs construction in steganography[J].IEEE Transactions on Information Forensics and Security, 2010, 5(4): 705-720. [17] MOHAND S A. Wavelet modeling using finite mixtures of generalized Gaussian distribution: application to texture discrimination and retrieval[J]. IEEE Transactions on Image Processing, 2012, 21(4):1452-1464. [18] PANYAVARAPORN J, HORKAEW P, WONGTRAIRAT W. QR code watermarking algorithm based on wavelet transform[C] // Proceedings of the 13th International Symposium on Communications and Information Technologies. Piscataway: IEEE, 2013:791-796. [19] JAMZAD M, YAGHMAEE F. Achieving higher stability in watermarking according to image complexity[J]. Scientia Iranica, 2006, 13(4):404-412. [20] HALLER R S. Complexity of real images evaluated by densitometric analysis and psychophysical scaling[D]. USA: University of Arizona, 1970. [21] 王向阳,杨红颖,郑宏亮,等.基于视觉权值的分块颜色直方图图像检索算法[J].自动化学报,2010,36(10):1489-1492. WANG Xiangyang, YANG Hongying, ZHENG Hongliang, et al. A Color block-histogram image retrieval based on visual weight[J].Acta Automatica Sinica, 2010, 36(10):1489-1492. [22] DELAIGLE J F, DEVLEESCHOUWER C, MACQ B, et al. Human visual system fea-tures enabling watermarking[C] //Proceedings of 2002 IEEE International Conference on Multimedia and Expo. New York: IEEE, 2002: 489-492. [23] JAIN A K, 韩博, 徐枫. 数字图像处理基础[M]. 北京:清华大学出版社,2006. JAIN A K, HAN Bo, XU Feng. Foundation of digital image processing[M]. Beijing: Tsinghua University Press, 2006. [24] WU Jianzhen, XIE Jianying, YANG Yupu. An adaptive blind watermarking scheme utilizing neural network for synch ronization[J]. Journal of Harbin Institute of Technology, 2007, 14(2):281-286. [25] KER A D. A capacity result for batch steganography [J]. IEEE Signal Process Let, 2007, 14(8):525-528. |
|