[1] 张弢, 慕德俊, 任帅, 等. 利用内切球解析的三维模型信息隐藏算法 [J]. 西安电子科技大学学报, 2014, 41(2): 224-230.
Zhang Tao, Mu Dejun, Ren Shuai, et al. Information Hiding Scheme for 3D Models Based on Skeleton and Inscribed Sphere Analysis [J]. Journal of Xidian University, 2014, 41(2): 224-230.
[2] Kinoshita H. An Image Digital Signature System with ZKIP for the Graph Isomorphism Problem [C]//Proceedings of the 3rd IEEE Conference on Image Processing. New York: IEEE, 1996: 247-250.
[3] 张应辉, 李晖, 马华. Schnorr类有序多重签名中的阈下信道的封闭协议 [J]. 西安电子科技大学学报, 2011, 38(3): 140-144.
Zhang Yinghui, Li Hui, Ma Hua. Free Protocol for the Subliminal Channels in the Schnorr-type Ordinal Multi-signature Schemes [J]. Journal of Xidian University, 2011, 38(3): 140-144.
[4] Gopalakrishnan K, Memon N, Vora P L. Protocols for Watermark Verification: Multimedia and Security [J]. IEEE Multimedia, 2001, 8(4): 66-70.
[5] Cox I J, Kilian J, Leighton F T, et al. Secure Spread Spectrum Watermarking for Multimedia [J]. IEEE Transactions on Image Processing, 1997, 6(12): 1673-1687.
[6] Craver S. Zero Knowledge Watermark Detection [C]//Proceedings of the 3rd International Workshop on Information Hiding—Lecture Notes in Computer Science: 1768. Berlin: Springer-Verlag, 2000: 101-116.
[7] Adelsbach A, Sadeghi A R. Zero Knowledge Watermark Detection and Proof of Ownership [C]//Proceedings of the 4th International Workshop on Information Hiding—Lecture Notes in Computer Science: 2137. Berlin: Springer-Verlag, 2001: 273-287.
[8] Adelsbach A, Katzenbeisser S, Sadeghi A R. Cryptography Meets Watermarking: Detecting Watermarks with Minimal or Zero Knowledge Disclosure [C]//Proceedings of 11th European Signal Processing Conference. Piscataway: IEEE, 2002: 446-449.
[9] 邹潇湘,戴琼,黄晁,等. 零知识水印验证协议[J]. 软件学报, 2003, 14(9): 1645-1651.
Zou Xiaoxiang, Dai Qiong, Huang Chao, et al. Zero-Knowledge Watermark Verification Protocols [J]. Journal of Software, 2003, 14(9): 1645-1651.
[10] Shi Y Q, Sutthiwan P, Chen L. Textural Features for Steganalysis[C]//Proceedings of the 14th Intemational Workshop on Information Hiding—Lecture Notes in Computer Science: 7692. Berlin: Springer-Verlag, 2013: 63-77.
[11] Feng B, Wang Z H, Wang D, et al. A Novel, Reversible, Chinese Text Information Hiding Scheme Based on Lookalike Traditional and Simplified Chinese Characters[J]. KSII Transactions on Internet and Information Systems (TIIS), 2014, 8(1): 269-281.
[12] Wang X T, Chang C C, Nguyen T S, et al. Reversible Data Hiding for High Quality Images Exploiting Interpolation and Direction Order Mechanism[J]. Digital Signal Processing, 2013, 23(2): 569-577.
[13] Srinivasan A, Kolli S, Wu J. Steganographic Information Hiding That Exploits a Novel File System Vulnerability[J]. International Journal of Security and Networks, 2013, 8(2): 82-93.
[14] Schottle P, Bhme R. A Game-theoretic Approach to Content-adaptive Steganography[C]//Proceedings of the 14th International Workshop on Information Hiding—Lecture Notes in Computer Science: 7692. Berlin: Springer-Verlag, 2013: 125-141.
[15] Katzenbeisser S, Petitcolas F. Information Hiding Techniques for Steganography and Digital Watermarking [J]. The EDP Audit, Control, and Security Newsletter, 2000, 28(6): 1-2.
[16] Aghddm M H, Ghasem-Aghaee N, Basivi M E. Text Feature Selection Using Ant Colony Optimization [J]. Expert Systems with Applications, 2009, 36(3): 6843-6853.
[17] Jaseena K U, Anita J. An Invisible Zero Watermarking Algorithm Using Combined Image and Text for Protecting Text Documents [J]. International Journal on Computer Science and Engineering, 2011, 3(6): 2265-2272.
[18] Tsoumakas G, Katakis O. Multi-label Classification: an Overview [J]. International Journal of Data Warehousing and Mining, 2007, 3(3): 1-13. |