Computer Science ›› 2014, Vol. 41 ›› Issue (3): 172-175.
Previous Articles Next Articles
XIE Jian-quan,XIE Qing and HUANG Da-zu
[1] Nezhadarya E,Wang J,Ward R K.Image watermarking based on multiscale gradient direction quantization[J].IEEE Transactions on Information Forensics and Security,2011,6(4):1200-1213 [2] 姜传贤,陈孝威,李智.基于文本重要内容的鲁棒水印算法[J].自动化学报,2010,36(9):1250-1256 [3] Zhou X M,Wang S C,Xiong S C,et al.Attack model and performance evaluation of text digital watermarking[J].Journal of Computers,2010,5(12):1933-1941 [4] 陈够喜,陈俊杰.多载体信息隐藏安全性研究[J].小型微型计算机系统,2011,32(4):644-646 [5] Ker A D.Steganalysis of embedding in two least-significant bits [J].IEEE Transitions on Information Forensics and Security,2007,1(2):46-54 [6] 雷雨,杨晓元,潘晓中,等.基于局部随机性的YASS隐写分析方法[J].计算机学报,2010,3(10):1997-2002 [7] Fillatre L.Adaptive Steganalysis of Least Significant Bit Re-placement in Grayscale Natural Images[J].IEEE Transactions on Signal Processing,2012,60(2):556-569 [8] 张湛,刘光杰,戴跃伟,等.基于Markov链安全性的二阶统计保持隐写算法[J].中国图象图形学报,2010,5(8):1175-1181 [9] Samir K B,Avishek R,Tuhin U P.A palette based approach for invisible digital watermarking using the concept of run-length[A]∥2010International Conference on Computational Intelligence and Communication Networks,CICN 2010[C].2010:83-87 [10] 继军,杨义先.图像LSB隐藏游程检测算法[J].西安邮电学院学报,2005,0(1):1-5 [11] 李航,路羊,崔慧娟,等.基于频域的结构相似度的图像质量评价方法[J].清华大学学报:自然科学版,2009,49(4):559-562 [12] 罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(10):463-473 [13] 谢建全,谢勍,黄大足.图像信息隐藏不可感知性指标研究[J].小型微型计算机系统,2011,32(5):953-957 [14] 刘春庆,梁光岚,王朔中,等.应用二值图像信息隐藏技术实现彩色图像中的安全隐写[J].应用科学学报,2007,5(4):342-347 [15] 马秀莹,林家骏.信息隐藏性能评价方法[J].中国图象图形学报,2011,6(2):209-214 |
No related articles found! |
|