Computer Science ›› 2019, Vol. 46 ›› Issue (6): 174-179.doi: 10.11896/j.issn.1002-137X.2019.06.026
Previous Articles Next Articles
MU Xiao-fang1, DENG Hong-xia2, LI Xiao-bin3, ZHAO Peng4
CLC Number:
[1]SI Y F,WEI L X,ZHANG Y N,et al.Revised Steganography Scheme Based on SI-UNIWARD[J].Computer Science,2016,43(5):108-112. [2]SUN X,ZHANG W M,YU N H,et al.Steganography based on parameters’ disturbance of spatial image transform[J].Journal on Communications,2017,38(10):166-174. [3]ZHANG Y W,ZHANG W M,YU N H.Specific Testing Sample Steganalysis[J].Journal of Software,2018,29(4):987-1001. [4]ZHANG Y,LIU F,YANG C,et al.Steganalysis of content-adaptive JPEG steganography based on Gauss partial derivative filter bank[J].Journal of Electronic Imaging,2017,26(1):013011. [5]JIAN Y,NI J,YANG Y.Deep Learning Hierarchical Representations for Image Steganalysis[J].IEEE Transactions on Information Forensics & Security,2017,12(11):2545-2557. [6]ZENG J,TAN S,LI B,et al.Large-Scale JPEG Image Steganalysis Using Hybrid Deep-Learning Framework[J].IEEETransa-ctions on Information Forensics & Security,2018,13(5):1200-1214. [7]KARAMPIDIS K,KAVALLIERATOU E,PAPADOURAKIS G. A review of image steganalysis techniques for digital forensics[J].Journal of Information Security & Applications,2018,40(4):217-235. [8]WANG Y J,NIU K,YANG X Y.Information hiding scheme based on generative adversarial network[J].Journal of Computer Applications,2018,38(10):2923-2928. [9]DUAN R,CHEN D.Video steganography algorithm uses motion vector difference as carrier[J].Journal of Image andGraphi-cs,2018,23(2):163-173. [10]CAO Z,ZHANG M Q,SUN W J,et al.Novel Steganalysis Algorithm Combine Rotating Forest Transformation with Multiple Classifi-ers Ensemble[J].Journal of Chinese Computer Systems,2017,38(10):2297-2302. [11]HAO Z,TAO Z,CHEN H.Revisiting weighted Stego-image Steganalysis for PVD steganography[J].Multimedia Tools & Applications,2018,3(2):1-19. [12]SONG X,LIU F,LUO X,et al.Steganalysis of perturbed quantization steganography based on the enhanced histogram features[J].Multimedia Tools and Applications,2015,74(24):11045-11071. [13]SURYAWANSHI G R,MALI S N.Universal steganalysis using IQM and multiclass discriminator for digital images[C]∥International Conference on Signal Processing.2017. [14]WU S,ZHONG S,LIU Y.Deep residual learning for image steganalysis[J].Multimedia Tools & Applications,2017,77(9):1-17. [15]HAO Z,PING X J,MANKUN X U,et al.Steganalysis by subtractive pixel adjacency matrix and dimensionality reduction[J].Science China Information Sciences,2014,57(4):1-7. [16]BOROUMAND M,FRIDRICH J.Applications of Explicit Non-Linear Feature Maps in Steganalysis[J].IEEE Transactions on Information Forensics & Security,2018,13(4):823-833. [17]NOURI R,MANSOURI A.Blind image steganalysis based on reciprocal singular value curve[C]∥Iranian Conference on Machine Vision and Image Processing.IEEE,2015:124-127. [18]CHANG K K,HUO J Y,MEI K.A Gbest-Guided Aritificial Bee Colony Algorithm with Hunting Factor .Journal of Chongqing University of Technology(Natural Science) ,2017(6):160-165,187.(in Chinese) 常扣扣,火久元,梅凯.一种带搜索因子的全局最优人工蜂群算法.重庆理工大学学报(自然科学版),2017(6):160-165,187. |
[1] | WU Gong-xing, Sun Zhao-yang, JU Chun-hua. Closed-loop Supply Chain Network Design Model Considering Interruption Risk and Fuzzy Pricing [J]. Computer Science, 2022, 49(7): 220-225. |
[2] | SHI Ke-xiang, BAO Li-yong, DING Hong-wei, GUAN Zheng, ZHAO Lei. Chaos Artificial Bee Colony Algorithm Based on Homogenizing Optimization of Generated Time Series [J]. Computer Science, 2021, 48(7): 270-280. |
[3] | CHEN Hai-biao, HUANG Sheng-yong, CAI Jie-rui. Trust Evaluation Protocol for Cross-layer Routing Based on Smart Grid [J]. Computer Science, 2021, 48(6A): 491-497. |
[4] | LIU Zhang-hui, ZHAO Xu, LIN Bing, CHEN Xing. Data Placement Strategy of Scientific Workflow Based on Fuzzy Theory in Hybrid Cloud [J]. Computer Science, 2021, 48(11): 199-207. |
[5] | PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331. |
[6] | HUO Jiu-yuan, WANG Ye, HU Zhuo-ya. Convergence Analysis of Artificial Bee Colony Algorithm:Combination of Number and Shape [J]. Computer Science, 2018, 45(10): 212-216. |
[7] | LI Zhen, ZHANG Zhuo and WANG Li-ming. Research on Text Classification Algorithm Based on Triadic Concept Analysis [J]. Computer Science, 2017, 44(8): 207-215. |
[8] | YANG Hua, ZHANG Hang, ZHANG Jiang, YANG Liu and LI Jiong. Initial Separating-matrix Optimized Online Blind Source Separation Algorithm [J]. Computer Science, 2016, 43(Z6): 265-267. |
[9] | XING Rong-hua and HUANG Hai-yan. Researches on Wireless Sensor Network Localization Based on Improved Gbest-guided Artificial Bee Colony Algorithm [J]. Computer Science, 2016, 43(12): 273-276. |
[10] | ZHONG Fu, GUO Jian-sheng, ZHANG Si-jia and WANG Zu-tong. Supply Chain Competitiveness Evaluation Method Based on Optimized Support Vector Machine [J]. Computer Science, 2015, 42(Z11): 27-31. |
[11] | DU Jing-yi and LIU Wen-hui. Analysis of Grounding Grid Corrosion Grade Based on Extraction of Color and Texture [J]. Computer Science, 2015, 42(Z11): 169-172. |
[12] | GE Yu and LIANG Jing. Multi-objective Artificial Bee Colony Algorithm [J]. Computer Science, 2015, 42(9): 257-262. |
[13] | KONG Xiang-yu, LIU San-yang and WANG Zhen. Almost Sure Convergence of Artificial Bee Colony Algorithm:A Martingale Method [J]. Computer Science, 2015, 42(9): 246-248. |
[14] | SUN Jin-guang and LIU Shuang-jiu. D-Tile for Texture Synthesis Based on Artificial Bee Colony [J]. Computer Science, 2015, 42(2): 287-291. |
[15] | ZHAO Zhi-yong,LI Yuan-xiang and YU Fei. Artificial Bee Colony Algorithm Based on Ito Algorithm [J]. Computer Science, 2014, 41(Z6): 29-32. |
|