[1] |
刘瑞祯, 谭铁牛. 数字图像水印研究综述[J]. 通信学报, 2000, 8:39-48.
|
|
LIU Ruizhen, TAN Tieniu. A Review of Digital Image Watermarking Research[J]. Journal of Communications, 2000, 8:39-48.
|
[2] |
周琳娜, 唐鑫, 吴正哲, 等. 优化块选择策略的高性能可逆信息隐藏算法[J]. 西安电子科技大学学报, 2023, 50(2):112-124.
|
|
ZHOU linna, TANG Xin, WU Zhengzhe, et al. High Performance Reversible Information Hiding Algorithm for Optimizing Block Selection Strategy[J]. Journal of Xidian University, 2023, 50 (2):112-124.
|
[3] |
WESTFELD A. F5-a Steganographic Algorithm[C]// Internnational Workshop on Information Hiding.Heidelberg:Springer, 2001:289-302.
|
[4] |
SCHÖNFELD D, WINKLER A. Embedding with Syndromecoding Based on BCH Codes[C]// Proceedings of the 8th Workshop on Multimedia and Security. New York: ACM, 2006:214-223.
|
[5] |
FILLER T, JUDAS J, FRIDRICH J. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J]. IEEE Transactions on Information on Forensics and Security, 2011, 6(3):920-935.
doi: 10.1109/TIFS.2011.2134094
|
[6] |
LI B, MING W, LI X, et al. A Strategy of Clustering Modification on Directions in Spatial Image Steganography[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(9):1905-1917.
doi: 10.1109/TIFS.2015.2434600
|
[7] |
SU W, NI J, HU X, et al. Image Steganography with Symmetric Embedding Using Gaussian Markov Random Field Model[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 31(3):1001-115
doi: 10.1109/TCSVT.76
|
[8] |
HU X, NI J, SHI Y. Efficient JPEG Steganography Using Domain Transformation of Embedding Entropy[J]. IEEE Signal Processing Letters, 2018, 25(6):773-777.
doi: 10.1109/LSP.97
|
[9] |
FILLER T, FRIDRICH J. Gibbs Construction in Steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4):705-720.
doi: 10.1109/TIFS.2010.2077629
|
[10] |
HOLUB V, FRIDRICH J. Designing Steganographic Distortion Using Directional Filters[C]// 2012 IEEE International Workshop on Information Forensics and Security(WIFS).Piscataway:IEEE, 2012:234-239.
|
[11] |
HOLUB V, FRIDRICH J, DENEMARK T. Universal Distortion Function for Steganography in an ArbItrary Domain[J]. EURASIP Journal on Information Security, 2014, 2014(1):1-13.
doi: 10.1186/1687-417X-2014-1
|
[12] |
LI B, TAN S, WANG M, et al. Investigation on Cost Assignment in Spatial Image Steganography[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(8):1264-1277.
doi: 10.1109/TIFS.2014.2326954
|
[13] |
SEDIGHI V, COGRANNE R, FRIDRICH J. Contentadaptive Steganography by Minimizing Statistical Detectability[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(2):221-234.
|
[14] |
ZHOU W, ZHANG W, YU N. A New Rule for Cost Reassignmentin Adaptive Steganography[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(11):2654-2667.
doi: 10.1109/TIFS.2017.2718480
|
[15] |
FRIDRICH J, KODOVSKY J. Rich Models for Steganallysis of Digital Images[J]. IEEE Transactions on Information Forensics and Security 2012, 7(3):868-882.
doi: 10.1109/TIFS.2012.2190402
|
[16] |
KODOVSKY J, FRIDRICH J, HOLUB V. Ensemble Classifiers for Steganalysis of Digital Media[J]. IEEE Transactions on Information Forensics and Security, 2011, 7(2):432-444.
doi: 10.1109/TIFS.2011.2175919
|
[17] |
DENEMARK T, SEDIGHI V, HOLUB V, et al. Selectionchannel-Aware Rich Model for Steganalysis of Digital Images[C]// 2014 IEEE International Workshop on Information Forensics and Security (WIFS).Piscataway:IEEE, 2014:48-53.
|
[18] |
BAS P, FILLER T, PEVNÝ T. “Break Our Steganographic System”:the Ins and Outs of Organizing BSS[C]// International Workshop on Information Hiding.Heidelberg:Springer, 2011:59-70.
|