[1] |
钟黔川, 朱清新 . Blowfish 密码系统分析[J]. 计算机应用, 2007,27((12)): 2940-2944. ZHONG Q C , ZHU Q X . Analysis of Blowfish cryptography[J]. Computer Applications, 2007,27((12)): 2940-2944.
|
[2] |
CHANNALLI S , JADHAY A . Steganography-an art of hiding data [J]. International Journal on Computer Science and Engineering, 2009,1((3)): 137-141.
|
[3] |
JUNEJA M , SANDHU P S . An improved LSB based steganography technique for RGB color images[J]. International Journal of Computer and Communication Engineering, 2013,2((4)): 513-517.
|
[4] |
吴霞, 徐向阳, 黄友荣 . 抗统计分析的BPCS隐写算法[J]. 计算机工程与应用, 2007,43((7)): 52-54. WU X , XU X Y , HUANG Y R . BPCS steganography algorithm against statistical analysis[J]. Computer Engineering and Applications, 2007,43((7)): 52-54.
|
[5] |
李艳玲, 黄红艳 . 基于DFT域的图像信息隐藏技术[J]. 华北水利水电学院学报, 2008,29((4)): 62-64. LI Y L , HUANG H Y . Information hiding technology based on DFT domain[J]. Journal of North China Institute of Water Conservancy and Hydroelectric Power, 2008,29((4)): 62-64.
|
[6] |
JAMDAR A S , SHAH A V , GAVALI D D ,et al. Edge adaptive steganography using DWT [J]. International Journal of Engineering and Advanced Technology, 2013,2((4)): 648-652.
|
[7] |
DO M N , VETTERLI M . The contourlet transform:an efficient directional multiresolution image representation [J]. IEEE Transactions on Image Processing, 2005,14((12)): 2091-2106.
|
[8] |
CUNHA A L D , ZHOU J P , DO M.N . The nonsubsampled contourlet transform:theory,design,and applications[J]. IEEE Transactions on Image Processing, 2006,15((10)): 3089-3101.
|
[9] |
HILL L S , . Cryptography in an algebraic alphabet [J]. The American Mathematical Monthly, 1929,36((6)): 306-312.
|
[10] |
PAVAN N , NAGARJUN G A , NIHAAR N ,et al. Image steganography based on hill cipher with key hiding technique[J]. IOSR Journal of Computer Engineering, 2013,11((5)): 47-50.
|
[11] |
KARTHIKEYANB , CHAKRAVARTHYJ , RAMASUBRAMANIAN S . Amalgamation of scanning paths and modified hill cipher for secure steganography[J]. Australian Journal of Basic and Applied Sciences, 2012,6((7)): 55-61.
|
[12] |
KAUR A , KAUR S . Image steganography based on hybrid edge detection and 2k correction method[J]. International Journal of Engineering and Innovative Technology, 2012,1((2)): 167-170.
|
[13] |
SUN S L , GUO Y N . A novel image steganography based on contourlet transform and hill cipher[J]. Journal of Information Hiding and Multimedia Signal Processing, 2015,6((5)): 889-897.
|
[14] |
RAMEZANI H , KEYNIA F , RAMEZANI F . A novel image steganography in contourlet domain using genetic algorithm[J]. International Journal of Future Computer and Communication, 2013,2((4)): 359-363.
|
[15] |
闫芬, 王康碧, 李晨 ,等. 一种基于NSCT 与抖动量化的盲水印算法[J]. 云南民族大学学报:自然科学版, 2013,22((3)): 222-225. YAN F , WANG K B , LI C ,et al. A blind algorithm based on NSCT and dither quantization[J]. Journal of Yunnan Minzu University:Natural Sciences Edition, 2013,22((3)): 222-225.
|