参考文献 [ 1 ] 刘粉林,刘九芬,罗向阳,等. 数字图像隐写分析[M]. 北京:机械工业出版社,2010. [ 2 ] 王朔中,张新鹏,张卫明. 以数字图像为载体的隐写分析研究进展[J]. 计算机学报,2009,32(7):1247-1263. [ 3 ] 张新鹏,刘 焕,张颖春,等. 融合方向编码和湿纸编码的高效信息隐藏[J]. 上海大学学报:自然科学版, 2010,16(1):1-4. [ 4 ] Zhang Xinpeng, Wang Shuozhong. Efficient Steganographic Embedding by Exploiting Modification Direction[J]. IEEE Communications Letters,2006,10 (11):781-783. [ 5 ] Lin Kai Yung. Data Hiding by Exploiting Modification Direction Technique Using Optimal Pixel Grouping [C] / / Proc. of ICETC’10. [S. 1. ]:IEEE Press,2010: 121-123. [ 6 ] Hong W. An Efficient Prediction-and-shifting Embedding Technique for High Quality Reversible Data Hiding[J]. EURASIP Journal on Advances in Signal Processing,2010,10(1):105-118. [ 7 ] Lee C F,Chang C C,Wang K H. An Improvement of EMD Embedding Method for Large Payloads by Pixel Segmentation Strategy [ J ]. Image and Vision Computing,2008,26(12):1670-1676. [ 8 ] Wu D C, Tsai W H. A Steganographic Method for Images by Pixel Value Differencing [ J ]. Pattern Recognition Letters,2003,24(9):1613-1626. [ 9 ] Wang C M. A High Quality Steganographic Method with Pixel Value Differencing and Modulus Function [J]. Journal of Systems and Software,2008,81 (1): 150-158. [10] Hong W,Chen T S,Luo C W. Data Embedding Using Pixel Value Differencing and Diamond Encoding with Multiple Base Notational System[J]. Journal of Systems and Software,2012,85(5):1166-1175. [11] Lou D C. A Novel Adaptive Steganography Based on Local Complexity and Human Vision Sensitivity [ J]. Journal of Systems and Software,2010,83 (7):1236- 1248. [12] Qi Huiyan, Zheng Dong, Zhao Jiying. Human Visual System Based Adaptive Digital Image Watermarking [J]. Signal Processing,2008,88(1):174-188. [13] 潘 峰,李 军,杨晓元,等. 基于图像复杂度的隐写方法研究[ J ]. 计算机应用研究, 2011, 27 (8): 2712-2714. [14] 王海洋. 基于人眼灰度敏感特性的信息隐藏技术研究 [D]. 长沙:中南林业科技大学,2011. [15] Chao R M. A Novel Image Data Hiding Scheme with Diamond Encoding [ J ]. EURASIP Journal on Information Security,2009,(2009). [16] Hong Wien,Chen Tung-Shou. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching [J]. IEEE Transactions on Information Forensics and Security, 2012,7(1):176-184. 编辑 索书志 |