[1] Bender W, Gruhl D, Morimoto N, et al. Techniques for Data Hiding[J]. IBM System Journal, 1996, 35(3/4): 313-336. [2] Hsu C T, Wu Jialing. Hidden Digital Watermarks in Images[J]. IEEE Trans. on Image Processing, 1999, 8(1): 58-68. [3] Zhang Xinpeng, Wang Shuozhong, Zhang Kaiwen. Steganography with the Least Histogram Abnormality[C]//Proc. of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. [S. l.]: Springer, 2003: 401-412. [4] 刘粉林, 刘九芬, 罗向阳. 数字图像隐写分析[M]. 北京: 机械工业出版社, 2010. [5] Fridrich J, Goljan M, Soukal D. Perturbed Quantization Steganography[J]. ACM Multimedia and Security Journal, 2005, 11(2): 98-107. [6] Fridrich J, Goljan M, Lisonek P, et al. Writing on Wet Paper[J]. IEEE Trans. on Signal Processing, 2005, 53(10): 3923-3935. [7] Zhang Xinpeng, Wang Shuozhong. Efficient Steganographic Embedding by Exploiting Modification Direction[J]. IEEE Communications Letters, 2006, 10(11): 781-783. [8] Jung Ki-Hyun, Yoo Kee-Young. Improved Exploiting Modifi- cation Direction Method by Modulus Operation[J]. International Journal of Signal Processing, Image Processing and Pattern, 2009, 2(1): 79-87. [9] 张新鹏, 刘 焕, 张颖春, 等. 融合方向编码和湿纸编码的高效信息隐藏[J]. 上海大学学报: 自然科学版, 2010, 16(1): 1-4. [10] 郑江云, 江巨浪. 基于感觉容量的图像质量评价算法[J]. 计算机工程, 2010, 36(8): 222-223, 226.
|