Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 330-334.
• Information Security • Previous Articles Next Articles
LIU Zhong-yi, SHEN Xiang-chen, NI Lu-lin, XU Chun-gen
CLC Number:
[1]AL-DMOUR H,AL-ANI A.Quality optimized medical image information hiding algorithm that employs edge detection and data coding[J].Comput Methods Programs Biomed,2016,127:24-43. [2]YUE X,ZHOU C,XING Y P,et al.Improved LSB Algorithm of Image Hiding Based on Randomness[J].Applied Mechanics & Materials,2015,733:926-930. [3]JUNEJA M,SANDHU P S.Data Hiding with Enhanced LSB Steganography and Cryptography for RGB Color Images[J].Indian Journal of Applied Research,2011,3(5):118-120. [4]钮心忻.信息隐藏与数字水印[M].北京:北京邮电大学出版社,2004. [5]马文姬,张煜林.传统LSB图像隐藏算法的优化研究[J].电子产品世界,2016,23(9):61-63. [6]陈铭,张茹,刘凡凡,等.基于区域相关性的LSB 匹配隐写分析[J].通信学报,2010,31(3):1-11. [7]STINSON D R.Cryptography Theory and Practice (Third Edition)[M].北京:电子工业出版社,2009. [8]柏森,朱桂斌,曹玉强.信息隐藏算法及应用[M].北京:北京国防工业出版社,2015. [9]刘洁.信息隐藏技术及应用[J].现代情报,2004,24(6):204-205. [10]奚玲,平西建,张涛.基于相邻灰度值对互补嵌入的LSB匹配隐写改进算法[J].计算机科学,2010,37(9):101-104. [11]郭立甫,高媛,王嘉祯.图像LSB密写的信息隐藏量分析[J].计算机工程,2008,34(4):157-161. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[4] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[5] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[6] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[7] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[8] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[9] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[10] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[11] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[12] | LAI Teng-fei, ZHOU Hai-yang, YU Fei-hong. Real-time Extend Depth of Field Algorithm for Video Processing [J]. Computer Science, 2022, 49(6A): 314-318. |
[13] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[14] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[15] | JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278. |
|