Chen Weichao,Ao Junma,Ma Chunbo.Based on the characteristics of DCT image hiding algorithm of robust spread spectrum[J].Computer Engineering,2011,37(10):55-60.(in Chinese)
[3]
Celik M,Sharma G,Tekalp,et al.Lossless generalized-LSB data embedding[J].IEEE Transaction on Image Processing,2005,14(2):253-266.
[4]
Ker A.Steganalysis of LSB matching in grayscale images[J].IEEE Signal Processing Letters,2005,12(6):441-444.
Gao Qi,Li Renhou,Wang Huiqin,et al.Based on the gold code spread spectrum digital watermarking algorithm[J].Journal of Xi’an Jiao Tong University,2004,38(2):68-75.(in Chinese)
[9]
Bansal A,Bhadouria S.Network security and confidentiality with digital ateim arking[C]//Proceedings of 2007 Digatal E co-
[10]
Systems and Technologies Conference.Inaugural:IEEE-IES,2007:25-328.
Li Li,Ning Fan,Wei Jusheng.DA algorithm based on two dimensional DCT FPGA implementation[J].Modern Electronic Technology,2006,225(10):44-49.(in Chinese)
Sun Zhong,Xu Gang.A method based on the alpha stable distribution model of DCT domain information hiding detection method[J].Chinese Journal of Electronics,2008,36(4):45-53.(in Chinese)
[17]
Kuruoglu E E,Fitzgerald P W J,Rayner W J.Near optimal detection of signals in impulsive noise modeled with a sym-metric stable distribution[J].IEEE Communications Letter,1988,2(10):282-285.