Computer Science ›› 2021, Vol. 48 ›› Issue (9): 298-305.doi: 10.11896/jsjkx.200800199
• Information Security • Previous Articles Next Articles
MA Bin1, HOU Jin-cheng1, WANG Chun-peng1, LI Jian1, SHI Yun-qing2
CLC Number:
[1]BARTONJ M.Method and apparatus for embedding authentication information within digital data[OL].https://xueshu.baidu.com/usercenter/paper/show?paperid=1e1k02f0kp2c00s0fp4f0gh08n324784&site=xueshu_se. [2]SHI Y Q,NI Z,ZOU D,et al.Lossless data hiding:fundamentals,algorithms and applications[C]//International Symposium on Circuits & Systems.IEEE,2004:33-36. [3]COX I.Digital watermarking[J].Journal of Electronic Imaging,2002,11(3):414. [4]FRIDRICH J,GOLJAN M,DU R.Lossless Data Embedding-New Paradigm in Digital Watermarking[J].EURASIP Journal on Advances in Signal Processing,2002,2002(2):185-196. [5]FRIDRICH J,GOLJAN M,DU R.Invertible authentication[J].Proceedings of SPIE-The International Society for Optical Engineering,2001,4314:197-208. [6]CELIK M U,SHARMA G,TEKALP A M,et al.Lossless ge-neralized-LSB data embedding[J].IEEE Transactions on Image Processing,2005,14(2):253-266. [7]KALKER T,WILLEMS F M J.Capacity bounds and constructions for reversible data-hiding[C]// Electronic Imaging.International Society for Optics and Photonics,2003:71-76. [8]TIAN J.Reversible data embedding using a difference expansion[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(8):890-896. [9]ALATTAR A M.Reversible Watermark Using the DifferenceExpansion of a Generalized Integer Transform[J].IEEE Tran-sactions on Image Processing,2004,13(8):1147-1156. [10]HEIJMANS H.Reversible data embedding into images usingwavelet techniques and sorting[J].IEEE Trans.Image Process,2005,14(12):2082-2090. [11]KIM H J,SACHNEV V,SHI Y Q,et al.A Novel Difference Expansion Transform for Reversible Data Embedding[J].IEEE Transactions on Information Forensics and Security,2008,3(3):456-465. [12]NI Z,SHI Y Q,ANSARI N,et al.Reversible data hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362. [13]NI Z,SHI Y Q,ANSARI N,et al.Robust lossless image data hiding[J].IEEE Trans.on Circuits & Systems for Video Technology,2008,18(4):497-509. [14]TAI W L,YEH C M,CHANG C C.Reversible Data HidingBased on Histogram Modification of Pixel Differences[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(6):906-910. [15]THODI D M,RODRIGUEZ J J.Expansion Embedding Techniques for Reversible Watermarking[M].IEEE Press,2007,16(3):721-730. [16]SACHNEV V,KIM H J,NAM J,et al.Reversible data embedding using sorting and prediction[J].IEEE Transactions on Circuits and Systems for Video Technology,2009,19(7):989-999. [17]ZHANG X P.Reversible Data Hiding with Optimal ValueTransfer[J].IEEE Transactions on Multimedia,2013,15(2):316-325. [18]COLTUC D.Low Distortion Transform for Reversible Watermarking[J].IEEE Transactions on Image Processing,2012,21(1):412-417. [19]DRAGOI I C,COLTUC D.Local-Prediction-Based DifferenceExpansion Reversible Watermarking[J].IEEE Trans.Image Process,2014.23(4):1779-1790. [20]MA B,WANG X Y,LI Q,et al.Adaptive error prediction me-thod based on multiple linear regression for reversible data hi-ding[J].Journal of Real-Time Image Processing,2019,16(4):821-834. [21]VEEN M V D,BRUEKERS F,LEEST A V,et al.High capacity reversible watermarking for audio[C]//Proceedings of SPIE-The International Society for Optical Engineering.2003:2565-2568. [22] YAN D,WANG R.Reversible Data Hiding for Audio Based on Prediction Error Expansion[C]// International Conference on Intelligent Information Hiding and Multimedia Signal Proces-sing,2008(IIHMSP'08).IEEE Computer Society,2008. [23]NISHIMURA A.Reversible audio data hiding using linear prediction and error expansion[C]// 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing.IEEE,2011:318-321. [24]WANG F ,XIE Z X,CHEN Z.High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion[J/OL].The Scientific World Journal,2014.https://www.researchgate.net/publication/264537755_High_Capacity_Reversible_Watermarking_for_Audio_by_Histogram_Shifting_and_Predicted_Error_Expansion. [25]XIANG S J.Non-integer expansion embedding for prediction-based reversible watermarking[C]// International Workshop on Information Hiding.Berlin,Heidelberg:Springer,2012:224-239. [26]HUANG X P,ONO N,ECHIZEN I,et al.Reversible audio information hiding based on integer DCT coefficients with adaptive hiding locations[C]// International Workshop on Digital Watermarking.Berlin,Heidelberg:Springer,2013:376-389. [27]XIANG S J,LI Z H.Reversible audio data hiding algorithmusing noncausal prediction of alterable orders[J].EURASIP Journal on Audio,Speech,and Music Processing,2017(4):2017. [28]EBU Committee:sound quality assessment material recordings for subjective tests[OL].https://tech.ebu.ch/publications/sqamcd. |
[1] | CHEN Zhi-qiang, HAN Meng, LI Mu-hang, WU Hong-xin, ZHANG Xi-long. Survey of Concept Drift Handling Methods in Data Streams [J]. Computer Science, 2022, 49(9): 14-32. |
[2] | WANG Ming, WU Wen-fang, WANG Da-ling, FENG Shi, ZHANG Yi-fei. Generative Link Tree:A Counterfactual Explanation Generation Approach with High Data Fidelity [J]. Computer Science, 2022, 49(9): 33-40. |
[3] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[4] | ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63. |
[5] | SONG Jie, LIANG Mei-yu, XUE Zhe, DU Jun-ping, KOU Fei-fei. Scientific Paper Heterogeneous Graph Node Representation Learning Method Based onUnsupervised Clustering Level [J]. Computer Science, 2022, 49(9): 64-69. |
[6] | CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75. |
[7] | ZHENG Wen-ping, LIU Mei-lin, YANG Gui. Community Detection Algorithm Based on Node Stability and Neighbor Similarity [J]. Computer Science, 2022, 49(9): 83-91. |
[8] | LYU Xiao-feng, ZHAO Shu-liang, GAO Heng-da, WU Yong-liang, ZHANG Bao-qi. Short Texts Feautre Enrichment Method Based on Heterogeneous Information Network [J]. Computer Science, 2022, 49(9): 92-100. |
[9] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[10] | NIE Xiu-shan, PAN Jia-nan, TAN Zhi-fang, LIU Xin-fang, GUO Jie, YIN Yi-long. Overview of Natural Language Video Localization [J]. Computer Science, 2022, 49(9): 111-122. |
[11] | CAO Xiao-wen, LIANG Mei-yu, LU Kang-kang. Fine-grained Semantic Reasoning Based Cross-media Dual-way Adversarial Hashing Learning Model [J]. Computer Science, 2022, 49(9): 123-131. |
[12] | ZHOU Xu, QIAN Sheng-sheng, LI Zhang-ming, FANG Quan, XU Chang-sheng. Dual Variational Multi-modal Attention Network for Incomplete Social Event Classification [J]. Computer Science, 2022, 49(9): 132-138. |
[13] | DAI Yu, XU Lin-feng. Cross-image Text Reading Method Based on Text Line Matching [J]. Computer Science, 2022, 49(9): 139-145. |
[14] | QU Qian-wen, CHE Xiao-ping, QU Chen-xin, LI Jin-ru. Study on Information Perception Based User Presence in Virtual Reality [J]. Computer Science, 2022, 49(9): 146-154. |
[15] | ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161. |
|