[1] |
HUSSAIN M . Image steganography in spatial domain:a survey[J]. Signal Processing:Image Communication, 2018,65: 46-66.
|
[2] |
COSTA M . Writing on dirty paper[J]. IEEE Transaction on Inform Theory, 1983,29(3): 439-441.
|
[3] |
MOULIN P , O'SULLIVAN J A . Information-theoretic analysis of information hiding[J]. IEEE Transactions on Information Theory, 2003,49(3): 563-593.
|
[4] |
刘静, 汤光明 . 大容量自适应隐写对抗的博弈研究[J]. 电子学报, 2014(10): 1963-1969.
|
|
LIU J , TANG G M . Game research on large-payload and adaptive steganographic counterwork[J]. Acta Electronica Sinica, 2014(10): 1963-1969.
|
[5] |
LI J , YANG X , LIAO X ,et al. A game-theoretic method for designing distortion function in spatial steganography[J]. Multimedia Tools & Applications, 2016: 1-15.
|
[6] |
张新鹏, 钱振兴, 李晟 . 信息隐藏研究展望[J]. 应用科学学报, 2016,34(5): 475-489.
|
|
ZHANG X P , QIAN Z X , LI S . Prospect of digital steganography research[J]. Journal of Applied Sciences-Electronics and Information Engineering, 2016,34(5): 475-489.
|
[7] |
PEVNY T , FILLER T , BAS P . Using high-dimensional image models to perform highly undetectable steganography[C]// 12th International Workshop on Information Hiding. 2010: 161-177.
|
[8] |
LI B , WANG M , HUANG J ,et al. A new cost function for spatial image steganography[C]// IEEE International Conference on Image Processing. 2014: 4206-4210.
|
[9] |
SEDIGHI V , COGRANNE R , FRIDRICH J . Content-adaptive steganography by minimizing Statistical detectability[J]. IEEE Transactions on Information Forensics & Security, 2015,11(2): 221-234.
|
[10] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing embedding impact in steganography using trellis-coded quantization[C]// SPIE,Electronic Imaging,Media Forensics and Security XII, 2010: 18-20.
|
[11] |
FILLER T , JUDAS J , FRIDRICH J . Minimizing additive distortion in steganography using syndrome-trellis codes[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 920-935.
|
[12] |
BALUJA S , . Hiding images in plain sight:deep steganography[C]// Advances in Neural Information Processing Systems. 2017: 2066-2076.
|
[13] |
周志立, 曹燚, 孙星明 . 基于图像Bag-of-Words模型的无载体信息隐藏[J]. 应用科学学报, 2016,34(5): 527-536.
|
|
ZHOU Z L , CAO Y , SUN X M . Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences-Electronics and Information Engineering, 2016,34(5): 527-536.
|
[14] |
LI B , WANG M , LI X ,et al. A strategy of clustering modification directions in spatial image steganography[J]. IEEE Transactions on Information Forensics & Security, 2015,10(9): 1-14.
|