Computer Science ›› 2014, Vol. 41 ›› Issue (7): 206-209.doi: 10.11896/j.issn.1002-137X.2014.07.043
Previous Articles Next Articles
GAO Zhan-zhan,TANG Guang-ming and ZHANG Wei-wei
[1] 奚玲,平西建,张涛.基于相邻灰度值互补嵌入的LSB匹配隐写改进算法[J].计算机科学,2010,37(9):101-104 [2] Agaian S S,Sifuentes R R.Adaptive Steganography with In-creased Embedding Capacity for New Generation of Steganographic Systems [C]∥Proc of SPIE-IS&T Electronic Imaging.Bellingham:SPIE Press,2005:257-268 [3] Lou D C,Wu N I,Wang C M,et al.A Novel adaptive steganography based on local complexity and human vision sensitivity[J].Journal of Systems and Software,2010,83(7):1236-1248 [4] 张湛,刘光杰,戴跃伟,等.基于隐写编码和Markov模型的自适应图像隐写算法[J].计算机研究与发展,2012,49(8):1668-1675 [5] Filler T,Fridrich J.Design of Adaptive Steganographic Schemes for Digital Images[C]∥Proc of Media Watermarking,Security,and Forensics III.Bellingham:SPIE Press,2011,7880:1-14 [6] Kodovsky J,Holub V.On Dangers of Overtraining Steganography to Incomplete Cover Model[C]∥Proc of ACM Multimedia & Security Workshop.New York:ACM Press,2011:69-76 [7] Kodovsky J,Fridrich J.Steganalysis of JPEG Images Using Rich Model[C]∥Proc of Media Watermarking,Security,and Forensics XIV.Bellingham:SPIE Press,2012,8303:1-13 [8] Fridrich J,Pevny T,Kodovsky J.Statistically UndetectableJPEG Stenanography:Dead Ends,Challenges,and Opportunities[C]∥Proc of the 9th ACM Multimedia & Security Workshop.New York:ACM Press,2007:3-14 [9] 刘春庆,李忠新,王执铨.隐秘通信系统的对策论模型[J].通信学报,2004,25(5):160-165 [10] 刘光杰,戴跃伟,赵玉鑫,等.隐写对抗的博弈论建模[J].南京理工大学学报:自然科学版,2008,32(2):199-204 [11] Schottle P,Bohme R.A Game-Theoretic Approach to Content-Adaptive Steganography[C]∥Proc of Inforamtion Hiding.Berlin:Springer-Verlag,2012:125-141 [12] Fridrich J,Goljan M.Practical Steganalysis of Digital images:State of the Art[C]∥Proc of SPIE Photonics Imaging 2002,Security and Watermarking of Multimedia Contents IV.Bellingham:SPIE Press,2002,4675:1-13 [13] Pevny T,Bas P,Fridrich J.Steganalysis by Subtracting PixelAdjacency Matrix[J].IEEE Transactions on Information Forensics Security,2010,5(2):215-224 [14] Nash J.Equilibrium Points in n-Person Games[J].Proceedings of the National Academy of Sciences of the United States of America,1950,36:48-49 [15] Kodovsky J,Fridrich J.On Completeness of Feature Spaces in Blind Steganalysis[C]∥Proc of the 10th ACM Multimedia & Security Workshop.New York:ACM Press,2008:123-132 [16] Lyu S,Farid H.Steganalysis Using Higher-Order Image Statistics[J].IEEE Transactions on Information Forensics and Security,2006,1(1):111-119 [17] Orsdemir A,Altun H O,Sharna G,et al.Steganalysis Aware Steganography:Statistical Indistinguishability Despite High Distortion [C]∥Proc of Security,Forensics,Steganography,and Watermarking of Multimedia Contents X.Bellingham:SPIE Press,2008,6819:9-18 [18] Schaefer G,Stich M.UCID:An Uncompressed Color Image Database [C]∥Proc of SPIE Electronic Imaging,Storage and Retrieval Methods and Applications for Multimedia.Bellingham:SPIE Press,2003,5307:472-480 [19] 陈园园,朱孝成,叶甬渝.一种改进的DCT信息隐藏算法[J].重庆理工大学学报:自然科学版,2011,25(12):100-105 |
No related articles found! |
|