[9] |
TUCERYAN M , JAIN A K . Texture analysis,in:Handbook of pattern recognition and computer vision[M]. Singapore,World Scientific, 1993.
|
[10] |
HUANG D , SHAN C F , ARDABILIAN M ,et al. Local binary patterns and its application to facial image analysis:a survey[J]. IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews), 2011,41(6): 765-781.
|
[11] |
OJALA T , PIETIKAINEN M , MAENPAA T . Multiresolution gray-scale and rotation invariant texture classification with local binary patterns[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(7): 971-987.
|
[12] |
CHIEWK L , PIEPRZYK J . Estimating hidden message length in binary image embedded by using boundary pixels steganography[C]// Fifth International Conference on Availability,Reliability,and Security. 2010: 683-688.
|
[13] |
FENG B W , WENG J , LU W ,et al. Steganalysis of content-adaptive binary image data hiding[J]. Journal of Visual Communication and Image Representation, 2017,46: 119-127.
|
[14] |
CAO HONG , KOT A C . On establishing edge adaptive grid for bilevel image data hiding[J]. IEEETransactions on Information Forensics and Security, 2013,8(9): 1508-1518.
|
[15] |
CHEN J J , LU W , YEUNG Y ,et al. Binary image steganalysis based on distortion level co-occurrence matrix[J]. CMC-Computers Materials & Continua, 2018,55(2): 201-211.
|
[16] |
YANG H , KOT A C . Pattern-based data hiding for binary image authentication by connectivity preserving[J]. IEEE Transactions Multimedia, 2007,9(3): 475-486.
|
[17] |
CHEN J L , LU W , FANG Y M ,et al. Binary image steganalysis based on local texture pattern[J]. Journal of Visual Communication and Image Representation, 2018,55: 149-156.
|
[18] |
FENG B W , LU W , SUN W . Binary image steganalysis based on pixel mesh Markov transition matrix[J]. Journal of Visual Communication and Image Representation, 2015,26: 284-295.
|
[1] |
宋海涛, 汤光明, 孙怡峰 ,等. 数字隐写模型及形式化描述[J]. 网络与信息安全学报, 2020,6(3): 59-65.
|
|
SONG H T , TANG G M , SUN Y F ,et al. Digital steganography model and its formal description[J]. Chinese Journal of Network and Information Security, 2020,6(3): 59-65.
|
[2] |
FILLERT , FRIDRICH J . Gibbs construction in steganography[J]. IEEE Transactions on Information Forensics and Security, 2010,4(5): 705-720.
|
[3] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 920-935.
|
[4] |
MATSUI K , TANAKA K . Video_steganography:how to secretly embed a signature in a picture[J]. IMA Intellectual Property Project, 1994,1(1): 187-206.
|
[5] |
PAN H K , CHEN Y Y , TSENG Y C . A secure data hiding scheme for two-color images[C]// IEEE Symposium on Computers and Communications. 2000: 750-755.
|
[6] |
MEI Q , WONG E K , MEMON N . Data hiding in binary text documents[C]// Security and Watermarking of Multimedia Contents III. 2001: 369-375.
|
[7] |
FENG B W , LU W , SUN W . Secure binary image steganography based on minimizing the distortion on the texture[J]. IEEE Transactions on Information Forensics and Security, 2015,10(2): 243-255.
|
[8] |
ZHANG J H , LU W , YIN X L ,et al. Binary image steganography based on joint distortion measurement[J]. Journal of Visual Communication and Image Representation, 2019,58: 600-605.
|