Shen C X, Zhang H G, Feng D G, et al. Survey of Information Security[J]. Sci China Ser E, 2007, 37(2): 129-150. [沈昌祥,张焕国,冯登国,等. 信息安全综述[J].中国科学E辑:信息科学,2007,37(2):129-150.]
[2]
Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journa, 1996,35(3-4): 313-336.
[3]
Zhou Z P, Kang H, Lin J J, et al. A LSB steganalysis algorithm based on image wavele detail information[J]. Journal of Image and Graphics, 2008,13(6):1090-1093.[周治平, 康辉, 林家骏,等.小波细节信息的LSB隐写分析算法[J].中国图象图形学报, 2008,13(6):1090-1093.][DOI:10.11834/jig.20080610]
[4]
Sharp T. An implementation of key-based digital signal steganography[C]// Proceedings of 4th International Workshop on Information Hiding Pittsburgh, PA, USA Springer, 2001,2137:13-26.
[5]
Luo X Y, Lu P Z, Liu F L. A dynamic compensation LSB steganography method defeating SPA[J]. Chinese Journal of Computers, 2007,30(3):463-473. [罗向阳,陆佩忠,刘粉林.一类可抵御SPA分析的动态补偿LSB信息隐藏方法[J].计算机学报,2007,30(3):463-473.]
[6]
Mielikainen J. LSB matching revisited[J]. IEEE Signal Processing Letters, 2006,13(5), 285-287.
[7]
Chan C K, Cheng L M. Hiding data in images by simple LSB substitution[J]. Pattern Recognition, 2004,37(3): 469-474.
[8]
Fridrich J, Goljan M, Soukal D. Searching for the stego-key[C]// Security, Steganography, and Watermarking of Multimedia Contents VI. San Jose, CA: SPEE 2004,5306: 70-82.
[9]
Liu J, Kang Z W, He Y G. A steganographic method based on wavelet contrast and LSB[J]. Acta Electronica Sinica,2007,35(7): 1391-1393. [刘劲,康志伟,何怡刚.一种基于小波对比度和LSB的密写[J].电子学报,2007,35(7):1391-1393.]
[10]
Tao R, Zhang T, Li W X, et al. Images steganography against blind detection using integer wavelet transform[J]. Journal of Applied Sciences, 2010, 28(6): 592-600. [陶然,张涛,李文祥,等.应用整数小波变换的抗盲检测图像隐写[J].应用科学学报,2010,28(6):592-600.]
[11]
Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(3): 488-497.
[12]
Luo W Q, Huang F J, Huang J W. Edge adaptive image steganography based on LSB matching revisited [J]. IEEE Transactions on Information Forensics and Security, 2010,5(2):201-214.
[13]
Lou D C, Wu N I, Wang C M, et al. A novel adaptive steganography based on local complexity and human vision sensitivity[J]. The Journal of Systems and Software, 2010, 83(7); 1236-1248.
[14]
Zhang X P, Wang S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11): 781-783.
[15]
Lee C F, Wang Y R, Chang C C. A steganographic method with high embedding capacity by improving exploiting modification direction[C]// Proceedings of the 3rd International Conference on International Information Hiding and Multimedia Signal Processing. Washington, USA: IEEE Computer Society, 2007, 1: 497-500.
[16]
Kuo W C, Wuu L C, Shyi C N, et al. A data hiding scheme with high embedding capacity based on general improving exploiting modification direction method[C]// Proceedings of the 9th International Conference on Hybrid Intelligent Systems. Washington, USA: IEEE Computer Society, 2009,3:69-72.
[17]
Chao R M, Wu H C, Lee C C, et al. A novel image data hiding scheme with diamond encoding[J]. EURASIP Journal on Information Security, 2009:658047(1-9).
[18]
Liao Q N. Secure steganography based on modulo and Its cyclical characteristic[J]. Journal of Image and Graphics, 2012,17(10): 1206-1212. [廖琪男. 利用模运算及其周期性特点的安全隐写算法[J]. 中国图象图形学报, 2012, 17(10): 1206-1212.][DOI:10.11834/jig.20121002]
[19]
Qu Z G, Fu Y, Niu X X, et al. Improved EMD steganography with great embedding rate and high embedding efficiency[C]// Proceeding of the 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Washington USA: IEEE Computer Society, 2009: 348-352.
[20]
Zhang X P, Liu H, Zhang Y C, et al. Efficient data embedding by combining modification direction modulation and wet paper code[J]. Journal of Shanghai University: Natural science, 2010, 16(1): 1-4. [张新鹏,刘焕, 张颖春,等. 融合方向编码和湿纸编码的高效信息隐藏[J]. 上海大学学报: 自然科学版, 2010, 16(1): 1-4.]
[21]
更多...
[22]
Kieu T D, Chang C C. A steganographic scheme by fully exploiting modification directions[J]. Expert Systems with Applications, 2011,38(8):10648-10657.
[23]
Wang X T, Chang C C, Lin C C, et al. A novel multi-group exploiting modification direction method based on switch map[J]. Signal Processing, 2012, 92(6):1525-1535.