Computer Science ›› 2024, Vol. 51 ›› Issue (5): 374-381.doi: 10.11896/jsjkx.230300192
• Information Security • Previous Articles Next Articles
HAN Songyuan, WANG Hongxia, JIANG Ziyu
CLC Number:
[1]RESHETNIKOVA N,MAGOMEDOV M,BUKLANOV D.Digital finance technologies:threats and challenges to the global and national financial security[C]//IOP Conference Series:Earth and Environmental Science.IOP Publishing,2021. [2]China Internet Network Information Center.The 49th statistical report on Internet development in China[EB/OL].(2022-02-25).[2023-01-16].https://www.cnnic.net.cn/NMediaFile/old_attach/P020220721404263787858.pdf. [3]BABAPOUR CHAFI M,HULTBERG A,BOZIC YAMS N.Post-pandemic office work:Perceived challenges and opportunities for a sustainable work environment[J].Sustainability,2022,14(1):294. [4]ELIZABETH G.Microsoft Excel Statistics:Spreadsheets byNumbers[EB/OL].(2022-04-21).[2023-01-16].https://www.microbizmag.co.uk/microsoft-excel-statistics. [5]KRONTHALER F.Excel:A Brief Introduction to the Statistical Tools.In:Statistics Applied with Excel[M].Berlin:Springer,2023. [6]ANDERSON D R,SWEENEY D J,WILLIAMST A,et al.Essentials of modern business statistics with Microsoft Excel[M].Cengage Learning,2020. [7]LIU J P.Excel under the information technology application in financial management research[C]//2017 29th Chinese Control And Decision Conference(CCDC).IEEE,2017:2575-2578. [8]HSU C T,WU J L.Hidden digital watermarks in images[J].IEEE Transactions on Image Processing,1999,8(1):58-68. [9]PODILCHUK C I,DELP E J.Digital watermarking:algorithms and applications[J].IEEE Signal Processing Magazine,2001,18(4):33-46. [10]DITTMANN J,WOHLMACHER P,NAHRSTEDT K.Usingcryptographic and.watermarking algorithms[J].IEEE MultiMedia,2001,8(4):54-65. [11]LI Z C,WANG L M,GE S J,et al.A plain text watermarking method for big data based on orthogonal coding[J].Computer Science,2019,46(12):148-154. [12]XIAO C,ZHANG C,ZHENG C.Fontcode:Embedding information in text documents using glyph perturbation[J].ACM Transactions on Graphics(TOG),2018,37(2):1-16. [13]QIN C,JI P,CHANGC C,et al.Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery[J].IEEE MultiMedia,2018,25(3):36-48. [14]LIU Z,HUANG Y,HUANG J.Patchwork-based audio watermarking robust against de-synchronization and recapturing attacks[J].IEEE Transactions on Information Forensics and Security,2018,14(5):1171-1180. [15]YANG L,WANG H,ZHANG Y,et al.A Robust DCT-BasedVideo Watermarking Scheme Against Recompression and Synchronization Attacks[C]//International Workshop on Digital Watermarking.Cham:Springer,2021:149-162. [16]SU Q,LIU D,SUN Y.A robust adaptive blind color image watermarking for resisting geometric attacks[J].Information Sciences,2022,606:194-212. [17]ZHANG Z,LI F,ZUO X,et al.Reversible image watermarking algorithm based on reverse histogram translation[J].Multime-dia Tools and Applications,2022,82:11005-11019. [18]DONG L,CHEN J,PENG C,et al.Watermark-Preserving Keypoint Enhancement for Screen-Shooting Resilient Watermarking[C]//2022 IEEE International Conference on Multimedia and Expo(ICME).IEEE,2022:1-6. [19]SUN J,LI Y,ZHANG G,et al.Data traceability scheme of industrial control system based on digital watermark[C]//2022 7th IEEE International Conference on Data Science in Cyberspace(DSC).IEEE,2022:322-325. [20]ZHAO W J,GUAN H,HUANG Y,et al.A survey of text watermarking technology research[J].Journal of Communication University of China(Science and Technology),2020,27(6):55-62. [21]HORNG S J,ROSIYADI D,FAN P,et al.An adaptive watermarking scheme for e-government document images[J].Multimedia Tools and Applications,2014,72(3):3085-3103. [22]SINGH B,SHARMA M K.Efficient watermarking techniquefor protection and authentication of document images[J].Multimedia Tools and Applications,2022,81:22985-23005. [23]HUANG S,WU J K.Optical watermarking for printed document authentication[J].IEEE Transactions on Information Forensics and Security,2007,2(2):164-173. [24]SUZAKI M,SUTO M.A watermark embedding and extracting method for printed documents[J].Electronics and Communications in Japan(Part III:Fundamental Electronic Science),2005,88(7):43-51. [25]FANG H,ZHANG W,MA Z,et al.A camera shooting resilient watermarking scheme for underpainting documents[J].IEEE Transactions on Circuits and Systems for Video Technology,2019,30(11):4075-4089. [26]HILAL A M,AL-WESABI F N,ABDELMABOUD A,et al.A hybrid intelligent textwatermarking and natural language processing approach for transferring and receiving an authentic English text via internet[J].The Computer Journal,2022,65(2):423-435. [27]ABDELNABI S,FRITZ M.Adversarial watermarking trans-former:Towards tracing text provenance with data hiding[C]//2021 IEEE Symposium on Security and Privacy(SP).IEEE,2021:121-140. [28]ZHOU X,PENG W,YANG B,et al.Linguistic steganography based on adaptive probability distribution[J].IEEE Transactions on Dependable and Secure Computing,2022,19(5):2982-2997. [29]BRASSIL J T,LOW S,MAXMCHUK N F,et al.Electronicmarking and identification techniques to discourage document copying[J].IEEE Journal on Selected Areas in Communications,1995,13(8):1495-1504. [30]BRASSIL J T,LOW S,MAXEMCHUK N F.Copyright protection for the electronic distribution of text documents[J].Proceedings of the IEEE,1999,87(7):1181-1196. [31]HUANG H,QI C,LI J,et al.A new text digital watermarking strategy and detection method[J].Journal of Xi'an Jiaotong University,2002(2):165-168,181. [32]HUANG D,YAN H.Interword distance changes represented by sine waves for watermarking text images[J].IEEE Transactions on Circuits and Systems for Video Technology,2001,11(12):1237-1245. [33]CHENG D,LI X,QI W,et al.A statistics-based watermarking scheme robust to print-and-scan[C]//2008 International Symposium on Electronic Commerce and Security.IEEE,2008:894-898. [34]LI Q C,DONG Z H.Novel textwatermarking algorithm basedon Chinese characters structure[C]//2008 International Symposium on Computer Science and Computational Technology.IEEE,2008:348-351. [35]QI W,GUO W,ZHANG T,et al.Robust authentication for paper-based text documents based on text watermarking technology[J].Mathematical Biosciences and Engineering,2019,16(4):2233-2249. [36]ALOTAIBI R A,ELREFAEI L A.Improved capacity Arabictext watermarking methods based on open word space[J].Journal of King Saud University-Computer and Information Sciences,2018,30(2):236-248. [37]AL-NOFAIE S M A,GUTUB A A A.Utilizing pseudo-spaces to improve Arabic text steganography for multimedia data communications[J].Multimedia Tools and Applications,2020,79(1):19-67. [38]AHVANOOEY M T,LI Q,ZHU X,et al.ANiTW:A novel intelligent text watermarking technique for forensic identification of spurious information on social media[J].Computers & Secu-rity,2020,90:101702. [39]ZHANG Z Y,LI Q M,QI Y.Text watermark design based on invisible characters[J].Journal of Nanjing University of Science and Technology,2017,41(4):405-411. [40]LIU T Y,TSAI W H.A new steganographic method for data hiding in Microsoft Word documents by a change tracking technique[J].IEEE Transactions on Information Forensics and Security,2007,2(1):24-30. [41]IQBAL M M,KHADAM U,HAN K J,et al.A robust digital watermarking algorithm for text document copyright protection based on feature coding[C]//2019 15th International Wireless Communications & Mobile Computing Conference(IWCMC).IEEE,2019:1940-1945. [42]YANG L,GUO W,LU Y,et al.Text Watermarking forOOXML format documents based on color transformation[C]//2019 IEEE International Conference on Intelligence and Security Informatics(ISI).IEEE,2019:155-157. [43]LIU Y,SUN X,LIU Y,et al.Mimic-ppt:Mimicking-based steganography for Microsoft PowerPoint document[J].Inform.Technol.J,2008,7:654-660. [44]YANG W C,CHEN L H.A steganographic method via various animations in PowerPoint files[J].Multimedia Tools and Applications,2015,74:1003-1019. [45]YANG B,SUN X,XIANG L,et al.Steganography in MS Excel document using text-rotation technique[J].Information Technology Journal,2011,10(4):889-893. [46]ALSAADI H I,AL-ANNIM K,ALMUTTAIRI R M,et al.Text steganography in font color of MS Excel sheet[C]//Proceedings of the First International Conference on Data Science,E-learning and Information Systems.2018:1-7. [47]RYMAN D,IMBRIE P K,KASTNER J.Enhancement of plagia-rism detection techniques via watermarking[C]//2022 IEEE Frontiers in Education Conference(FIE).IEEE,2022:1-5. [48]BITAR A W,DARAZI R,COUCHOT J F,et al.Blind digital watermarking in PDF documents using Spread Transform Dither Modulation[J].Multimedia Toolsand Applications,2017,76:143-161. [49]KURIBAYASHI M,WONG K S.StealthPDF:Data hidingmethod for PDF file with no visual degradation[J].Journal of Information Security and Applications,2021,61:102875. [50]FU Z,SUN X,LIU Y,et al.Text split-based steganography in OOXML format documents for covert communication[J].Secu-rity and Communication Networks,2012,5(9):957-968. [51]PADDLEPADDLE AI STUDIO.Summary of financial datasets[EB/OL].(2022-01-24)[2023-01-16].https://aistudio.baidu.com/aistudio/projectdetail/3441337. |
[1] | LI Shasha, XING Hongjie. Robust Anomaly Detection Based on Adversarial Samples and AutoEncoder [J]. Computer Science, 2024, 51(5): 363-373. |
[2] | CHEN Jinyin, LI Xiao, JIN Haibo, CHEN Ruoxi, ZHENG Haibin, LI Hu. CheatKD:Knowledge Distillation Backdoor Attack Method Based on Poisoned Neuronal Assimilation [J]. Computer Science, 2024, 51(3): 351-359. |
[3] | HUANG Changxi, ZHAO Chengxin, JIANG Xiaoteng, LING Hefei, LIU Hui. Screen-shooting Resilient DCT Domain Watermarking Method Based on Deep Learning [J]. Computer Science, 2024, 51(2): 343-351. |
[4] | YAO Hongliang, YIN Zhiyuan, YANG Jing, YU Kui. Stock Market Trend Reasoning Algorithm Based on Game Dynamic Influence Diagram [J]. Computer Science, 2023, 50(11A): 221100039-7. |
[5] | ZHAO Zitian, ZHAN Wenhan, DUAN Hancong, WU Yue. Study on Adversarial Robustness of Deep Learning Models Based on SVD [J]. Computer Science, 2023, 50(10): 362-368. |
[6] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[7] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[8] | ZHANG Cheng-rui, CHEN Jun-jie, GUO Hao. Comparative Analysis of Robustness of Resting Human Brain Functional Hypernetwork Model [J]. Computer Science, 2022, 49(2): 241-247. |
[9] | WANG Xiao-ming, WEN Xu-yun, XU Meng-ting, ZHANG Dao-qiang. Graph Convolutional Network Adversarial Attack Method for Brain Disease Diagnosis [J]. Computer Science, 2022, 49(12): 340-345. |
[10] | MU Jun-fang, ZHENG Wen-ping, WANG Jie, LIANG Ji-ye. Robustness Analysis of Complex Network Based on Rewiring Mechanism [J]. Computer Science, 2021, 48(7): 130-136. |
[11] | WANG Xue-guang, ZHANG Ai-xin, DOU Bing-lin. Non-linear Load Capacity Model of Complex Networks [J]. Computer Science, 2021, 48(6): 282-287. |
[12] | TONG Xin, WANG Bin-jun, WANG Run-zheng, PAN Xiao-qin. Survey on Adversarial Sample of Deep Learning Towards Natural Language Processing [J]. Computer Science, 2021, 48(1): 258-267. |
[13] | WU Qing-hong, GAO Xiao-dong. Face Recognition in Non-ideal Environment Based on Sparse Representation and Support Vector Machine [J]. Computer Science, 2020, 47(6): 121-125. |
[14] | LU Dong-dong, WU Jie, LIU Peng, SHENG Yong-xiang. Analysis of Key Developer Type and Robustness of Collaboration Network in Open Source Software [J]. Computer Science, 2020, 47(12): 100-105. |
[15] | CHEN Xiao-wen, LIU Guang-shuai, LIU Wang-hua, LI Xu-rui. Blurred Image Recognition Based on LoG Edge Detection and Enhanced Local Phase Quantization [J]. Computer Science, 2020, 47(12): 197-204. |
|