Computer Science ›› 2019, Vol. 46 ›› Issue (1): 196-200.doi: 10.11896/j.issn.1002-137X.2019.01.030
• Information Security • Previous Articles Next Articles
MAO Bing-hua, WANG Zi-chi, ZHANG Xin-peng
CLC Number:
[1]LI B,TAN S,WANG M,et al.Investigation on Cost Assignment in Spatial Image Steganography[J].IEEE Transactions on Information Forensics & Security,2014,9(8):1264-1277.<br /> [2]ZHANG X.Behavior Steganography in Social Network[M]//Advances in Intelligent Information Hiding and Multimedia Signal Processing.Springer International Publishing,2017.<br /> [3]WEI Q,YIN Z,WANG Z,et al.Distortion function based on residual blocks for JPEG steganography[J].Multimedia Tools & Applications,2017(3):1-14.<br /> [4]FRIDRICH J,SOUKAL D.Matrix embedding for large payloads [J].IEEE Transactions on Information Forensics & Security,2006,1(3):390-395.<br /> [5]WESTFELD A.F5-A Steganographic Algorithm[C]//International Workshop on Information Hiding(IHW 2001).DBLP,2001:289-302.<br /> [6]FRIDRICH J.Statistically undetectable jpeg steganography: dead ends challenges,and opportunities[C]//The Workshop on Multimedia & Security.DBLP,2007:3-14.<br /> [7]ZHANG X,WANG S.Efficient Steganographic Embedding by Exploiting Modification Direction[J].Communications Letters IEEE,2006,10(11):781-783.<br /> [8]ZHANG W,ZHANG X,WANG S.Maximizing Steganographic Embedding Efficiency by Combining Hamming Codes and Wet Paper Codes[C]//International Workshop on Information Hi-ding.2008,5284:60-71.<br /> [9]FILLER T,JUDAS J,FRIDRICH J.Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes[J].IEEE Transactions on Information Forensics & Security,2012,6(3):920-935.<br /> [10]BAS P.Using high-dimensional image models to perform highly undetectable steganography[C]//International Workshop on Information Hiding.Springer-Verlag,2010:161-177.<br /> [11]HOLUB V,FRIDRICH J.Designing steganographic distortion using directional filters[C]//IEEE International Workshop on Information Forensics and Security.IEEE,2012:234-239.<br /> [12]LI B,WANG M,HUANG J,et al.A new cost function for spatial image steganography[C]//IEEE International Conference on Image Processing.IEEE,2015:4206-4210.<br /> [13]FRIDRICH J.Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model[C]//Proceedings of SPIE-The International Society for Optical Engineering,2015.<br /> [14]VOJTEˇCH H,FRIDRICH J.Digital image steganography using universal distortion[C]//ACM Workshop on Information Hi-ding and Multimedia Security.ACM,2013:59-68.<br /> [15]GUO L,NI J,SHI Y Q.Uniform Embedding for Efficient JPEG Steganography[J].IEEE Transactions on Information Forensics &Security,2014,9(5):814-825.<br /> [16]GUO L,NI J,SU W,et al.Using Statistical Image Model for JPEG Steganography:Uniform Embedding Revisited[J].IEEE Transactions on Information Forensics & Security,2015,10(12):2669-2680.<br /> [17]WANG Z,ZHANG X,YIN Z.Hybrid distortion function for JPEG steganography[J].Journal of Electronic Imaging,2016,25(5):050501.<br /> [18]SI Y F,WEI L X,ZHANG Y N,et al.Improved Steganography Based on SI-UNIWARD Distortion Function[J].ComputerScien-ce,2016,43(5):108-112.(in Chinese)<br /> 司一帆,魏立线,张英男,等.基于SI-UNIWARD失真函数的改进隐写方案[J].计算机科学,2016,43(5):108-112<br /> [19]WANG Z,LV J,WEI Q,et al.Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change[C]//International Workshop on Digital Watermarking.Springer International Publishing,2016:487-493.<br /> [20]PENNEBAKER W B,MITCHELL J L.JPEG Still Image Data Compression Standard[M].Norwell:Kluwer AcademicPubli-shers,1992.<br /> [21]WANG Z,YIN Z,ZHANG X.Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain[J].IETE Technical Review,2017,34:1-8.<br /> [22]SCHAEFER G.UCID:an uncompressed color image database [C]//Storage & Retrieval Methods & Applications for Multimedia.DBLP,2003:472-480.<br /> [23]HOLUB V,FRIDRICH J.Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT[J].IEEE Transactions on Information Forensics & Security,2015,10(2):219-228.<br /> [24]SONG X,LIU F,YANG C,et al.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters[C]//ACM Workshop on Information Hiding and Multimedia Security.ACM,2015:15-23.<br /> [25]KODOVSKY J,FRIDRICH J,HOLUB V.Ensemble Classifiers for Steganalysis of Digital Media[J].IEEE Transactions on Information Forensics & Security,2012,7(2):432-444. |
[1] | ZHOU Xiao-shi, ZHANG Zi-wei, WEN Juan. Natural Language Steganography Based on Neural Machine Translation [J]. Computer Science, 2021, 48(11A): 557-564. |
[2] | ZHANG Yao, PAN Feng, SHEN Jun-wei and LI Ning-bo. Adaptive Post-type Steganography Algorithm Based on MP3 [J]. Computer Science, 2016, 43(8): 114-117. |
[3] | SI Yi-fan, WEI Li-xian, ZHANG Ying-nan and LIU Jia. Revised Steganography Scheme Based on SI-UNIWARD [J]. Computer Science, 2016, 43(5): 108-112. |
[4] | GAO Zhan-zhan,TANG Guang-ming and ZHANG Wei-wei. Game Analysis on Statistical Characteristics Preserving Steganography [J]. Computer Science, 2014, 41(7): 206-209. |
[5] | . Steganographic Research for Batch Binary Images [J]. Computer Science, 2011, 38(11): 271-274. |
[6] | HE Jun-hui,TANG Shao-hua,XING Yi-bo. Secure Image Steganography Based on Step-varying Quantization [J]. Computer Science, 2009, 36(7): 56-59. |
[7] | . [J]. Computer Science, 2009, 36(6): 265-267. |
[8] | GE Shen ,GAO Yang, ZHOU Ru-Yi (National Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093). [J]. Computer Science, 2007, 34(1): 144-147. |
|