[1] |
李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11.
|
|
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11.
|
[2] |
孙树亮 . 基于非下采样Contourlet变换和Hill编码的图像隐写[J]. 电信科学, 2016,32(6): 124-128.
|
|
SUN S L . Image steganography based on nonsubsampled Contourlet transform and Hill cipher[J]. Telecommunications Science, 2016,32(6): 124-128.
|
[3] |
DUTTA H , DAS R K , NANDI S ,et al. An overview of digital audio steganography[J]. IETE Technical Review, 2020,37(6): 632-650.
|
[4] |
邹明光, 李芝棠 . 基于振幅值修改的 wav 音频隐写算法[J]. 通信学报, 2014(z1): 36-40.
|
|
ZOU M G , LI Z T . Wav-audio steganography algorithm based on amplitude modifying[J]. Journal on Communications, 2014(z1): 36-40.
|
[5] |
LIU H L , LIU J J , HU R G ,et al. Adaptive audio steganography scheme based on wavelet packet energy[C]// 2017 IEEE 3rd international conference on big data security on cloud (bigdatasecurity),IEEE international conference on high performance and smart computing (hpsc),and IEEE international conference on intelligent data and security (ids). Piscataway:IEEE Press, 2017: 26-31.
|
[6] |
AHANI S , GHAEMMAGHAMI S , WANG Z J . A sparse representation-based wavelet domain speech steganography method[J]. IEEE/ACM Transactions on Audio,Speech,and Language Processing, 2015,23(1): 80-91.
|
[7] |
MELIGY A M , NASEF M M , EID F T . An efficient method to audio steganography based on modification of least significant bit technique using random keys[J]. International Journal of Computer Network and Information Security, 2015,7(7): 24-29.
|
[8] |
吴秋玲, 吴蒙 . 基于小波变换的语音信息隐藏新方法[J]. 电子与信息学报, 2016,38(4): 834-840.
|
|
WU Q L , WU M . Novel audio information hiding algorithm based on wavelet transform[J]. Journal of Electronics & Information Technology, 2016,38(4): 834-840.
|
[9] |
KANHE A , AGHILA G . A DCT-SVD-based speech steganography in voiced frames[J]. Circuits,Systems,and Signal Processing, 2018,37(11): 5049-5068.
|
[10] |
BHARTI S S , GUPTA M , AGARWAL S . A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately[J]. Multimedia Tools and Applications, 2019,78(16): 23179-23201.
|
[11] |
ALI A H , GEORGE L E , ZAIDAN A ,et al. High capacity,transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain[J]. Multimedia Tools and Applications, 2018,77(23): 31487-31516.
|
[12] |
张雪垣, 王让定, 严迪群 ,等. 基于分段 STC 的音频隐写算法[J]. 电信科学, 2019,35(7): 115-123.
|
|
ZHANG X Y , WANG R D , YAN D Q ,et al. An audio steganography algorithm based on segment-STC[J]. Telecommunications Science, 2019,35(7): 115-123.
|
[13] |
ZHANG X Y , WANG R D , YAN D Q ,et al. Selecting optimal submatrix for syndrome-trellis codes (STCs)-based steganography with segmentation[J]. IEEE Access, 2020,8: 61754-61766.
|
[14] |
SU Z P , ZHANG G F , YUE F ,et al. SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking[J]. IEEE Transactions on Multimedia, 2018,20(10): 2631-2644.
|
[15] |
STORN R , PRICE K . Differential evolution - A simple and efficient heuristic for global optimization over continuous spaces[J]. Journal of Global Optimization, 1997,11(4): 341-359.
|
[16] |
CHANG J H , KIM N S , MITRA S K . Voice activity detection based on multiple statistical models[J]. IEEE Transactions on Signal Processing, 2006,54(6): 1965-1976.
|
[17] |
LEI B Y , SOON I Y , TAN E L . Robust SVD-based audio watermarking scheme with differential evolution optimization[J]. IEEE Transactions on Audio,Speech,and Language Processing, 2013,21(11): 2368-2378.
|
[18] |
DAS S , SUGANTHAN P N . Differential evolution:a survey of the state-of-the-art[J]. IEEE Transactions on Evolutionary Computation, 2011,15(1): 4-31.
|
[19] |
YANG Z Y , TANG K , YAO X . Self-adaptive differential evolution with neighborhood search[C]// 2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence). Piscataway:IEEE Press, 2008: 1110-1116.
|
[20] |
JIANG S Z , YE D P , HUANG J Q ,et al. SmartSteganogaphy:Light-weight generative audio steganography model for smart embedding application[J]. Journal of Network and Computer Applications, 2020,165: 102689.
|