Journal on Communications ›› 2019, Vol. 40 ›› Issue (5): 211-222.doi: 10.11959/j.issn.1000-436x.2019108
• Correspondences • Previous Articles
Shuai REN1,Zhen WANG1(),Dongxu SU1,Tao ZHANG2,Dejun MU3
Revised:
2019-03-28
Online:
2019-05-25
Published:
2019-05-30
Supported by:
CLC Number:
Shuai REN,Zhen WANG,Dongxu SU,Tao ZHANG,Dejun MU. Information hiding algorithm based on mapping and structure data of 3D model[J]. Journal on Communications, 2019, 40(5): 211-222.
[35] | YAO X H . Image-based information masking technology[D]. Xi’an:Northwestern Polytechnical University, 2004: 16-22. |
[36] | 熊秋波 . 不规则区域纹理提取与3D模型贴图[D]. 长沙:中南林业科技大学, 2010: 20-29. |
XIONG Q B . The irregular regional texture extraction and 3d model mapping[D]. Changsha:Central South University of Forestry and Technology, 2010: 20-29. | |
[37] | 王新宇, 詹永照 . 构造顶点分布特征的三维模型数字水印算法[J]. 计算机辅助设计与图形学学报, 2014,26(2): 272-279. |
[1] | 王静, 郁梅, 蒋刚毅 ,等. 基于单深度帧内模式的3D-HEVC深度视频信息隐藏算法[J]. 光电子:激光, 2017(8): 893-901. |
WANG J , YU M , JIANG G Y ,et al. An information hiding algorithm of depth video in 3D-HEVC based on single depth intra mode[J]. Journal of Optoelectronics?Laser, 2017(8): 893-901. | |
[37] | WANG X Y , ZHAN Y Z . A watermarking scheme for three-dimensional models by constructing vertex distribution on characteristics[J]. Journal of Computer-Aided Design & Computer Graphics, 2014,26(2): 272-279. |
[38] | CARLSON N A , PORTER J R . On the cardinality of hausdorff spaces and h-closed spaces[J]. Topology & Its Applications, 2013,160(1): 137-142. |
[2] | YUAN Z Q , GUAN Z J , FENG H . An improved information hiding algorithm based on image[C]// IEEE International Conference on Software Engineering Research. IEEE, 2017. |
[3] | ZHOU X , GONG W , FU W L ,et al. An improved method for LSB based color image steganography combined with cryptography[C]// IEEE/ACIS International Conference on Computer & Information Science. IEEE/ACIS, 2016. |
[4] | LIU X S , ZHANG J X . Large-capacity LSB information hiding scheme based on two-dimensional code[C]// The 7th International Conference on Electronics Information and Emergency Communication. IEEE , 2017. |
[5] | TSAI Y Y , HUANG Y H , LIN R J ,et al. An adjustable interpolation-based data hiding algorithm based on LSB substitution and histogram shifting[J]. International Journal of Digital Crime & Forensics, 2016,8(2): 48-61. |
[6] | KER A D , . Improved detection of LSB steganography in grayscale images[C]// International Conference on Information Hiding. 2004: 97-115. |
[7] | DUMITRESCU S , WU X , WANG Z . Detection of LSB steganography via sample pair analysis[C]// Revised Papers From the International Workshop on Information Hiding. 2002: 355-372. |
[8] | FARID H , . Detecting hidden messages using higher-order statistical models[C]// International Conference on Image Processing. IEEE, 2002. |
[9] | SINGH V P , MALHOTRA S , SRIVASTAVA R . Combining hybrid information descriptors and DCT for improved CBIR performance[C]// International Conference on Control. IEEE, 2017. |
[39] | 张弢, 柳雨农, 邢亚林 ,等. 基于直方图移位的AMBTC域无损信息隐藏[J]. 计算机应用研究, 2019(6): 1-8. |
ZHANG T , LIU Y N , XING Y L , REN S ,et al. Lossless information hiding in ambtc domain based on histogram shift[J]. Application Research of Computers, 2019(6): 1-8. | |
[10] | PATEL P , PATEL Y . Secure and authentic DCT image steganography through DWT-SVD based digital watermarking with RSA encryption[C]// The 15th International Conference on Communication Systems & Network Technologies. IEEE, 2015. |
[11] | 邵菲, 花俊 . 基于 Walsh序列扩频的图像信息隐藏[J]. 国外电子测量技术, 2009,28(8): 32-34. |
[40] | 姜艳梅 . 抗RS检测的无损信息隐藏算法研究[D]. 天津:天津大学, 2007: 38-51. |
JIANG Y M . Research on lossless information hiding resisting rs detection[D]. Tianjin:Tianjin University, 2007: 38-51. | |
[11] | SHAO F , HUA J . Image information hiding based on Walsh sequence spread spectrum[J]. Foreign Electronic Measurement Technology, 2009,28(8): 32-34. |
[12] | 陈胜, 王兴众 . 基于离散余弦变换和置乱融合模型的图像信息隐藏方法研究[J]. 舰船电子工程, 2017(12): 64-67. |
CHEN S , WANG X Z . Research on image information hiding method based on DCT and scrambling fusion model[J]. Ship Electronic Engineering, 2017(12): 64-67. | |
[13] | TIJHUIS A G . Stability analysis of the marching-on-in-time method for one-and two-dimensional transient electromagnetic scattering problems[J]. Colloquium topics in applied numerical analysis, 1984(2): 363-386. |
[14] | SWELDENS W . The lifting scheme:a custom-design construction of biorthogonal wavelets[J]. Applied & Computational Harmonic Analysis, 1996,3(2): 186-200. |
[15] | SANGWINE S J . Fourier transforms of colour images using quaternion or hypercomplex,numbers[J]. Electronics Letters, 1996,32(21): 1979-1980. |
[16] | SANGWINE S J . Colour image edge detector based on quaternion convolution[J]. Electronics Letters, 2002,34(10): 969-971. |
[17] | MOXEY C E , ELL T A , SANGWINE S J . Hypercomplex operators and vector correlation[C]// Signal Processing Conference,IEEE, 2002: 1-4. |
[18] | 綦科, 张大方, 谢冬青 . 基于帧化采样和小波 HMM 的三维模型信息隐藏[J]. 计算机辅助设计与图形学学报, 2010,22(8): 1406-1411. |
QI K , ZHANG D F , XIE D Q . Steganography for three-dimensional model based on frame transform and hmm model in wavelet domain[J]. Journal of Computer-Aided Design & Computer Graphics, 2010,22(8): 1406-1411. | |
[19] | 任帅, 张弢, 杨涛 ,等. 基于三维模型球型分割的信息隐藏算法[J]. 计算机应用, 2017,37(9): 2576-2580. |
REN S , ZHANG T , YANG T ,et al. Information hiding algorithm based on spherical segmentation of three-dimensional model[J]. Journal of computer application, 2017,37(9): 2576-2580. | |
[20] | 张弢, 慕德俊, 任帅 ,等. 利用内切球解析的三维模型信息隐藏算法[J]. 西安电子科技大学学报, 2014,41(2): 185-190. |
ZHANG T , MU D J , REN S ,et al. Information hiding scheme for 3D models based on skeleton and inscribed sphere analysis[J]. Journal of Xidian University, 2014,41(2): 185-190. | |
[21] | 任帅, 张弢, 徐振超 ,等. 特征点标注与聚类的三维模型信息隐藏算法[J]. 计算机应用, 2018,38(4): 1017-1022. |
REN S , ZHANG T , XU Z C ,et al. Information hiding algorithm for 3D models based on feature point labeling and clustering[J]. Journal of Computer Applications, 2018,38(4): 1017-1022. | |
[22] | PUTEAUX P , PUECH W . Reversible data hiding in encrypted images based on adaptive local entropy analysis[C]// The 17th International Conference on Image Processing Theory. IEEE, 2018. |
[23] | ZHOU W , ZHANG W , YU N . A new rule for cost reassignment in adaptive steganography[J]. IEEE Transactions on Information Forensics and Security, 2017: 1-1. |
[24] | CHANDRAMOULI R , MEMON N D . Steganography capacity:a steganalysis perspective[J].,2003,5020. Security & Watermarking of Multimedia Contents V, 2003,5020. |
[25] | JOSEPH P , VISHNUKUMAR S . A study on steganographic techniques[C]// Global Conference on Communication Technologies (GCCT). IEEE, 2015: 206-210. |
[26] | COGRANNE R , SEDIGHI V , FRIDRICH J . Practical strategies for content-adaptive batch steganography and pooled steganalysis[C]// IEEE International Conference on Acoustics. 2017. |
[27] | GAO Z Z , TANG G M , DAI J M . Research on payload adaptive batch steganography[J]. Application Research of Computers, 2013,30(9): 2780-2783. |
[28] | 杨烨, 孙容海, 施林甫 ,等. 面向大文件的多载体图像信息隐藏方法[J]. 信息技术, 2018(5): 60-62. |
YANG Y , SUN R H , SHI L F ,et al. Multiple cover images based information hiding method for large file[J]. Information Technology, 2018(5): 60-62. | |
[29] | 黄福鸿 . 数字图像多算法协同隐写方案研究与设计[D]. 北京:北京邮电大学, 2018. |
HUANG H F . Research on scheme of multlple digital image a lgorithms cooperate for steganography[D]. Beijing:Beijing University of Posts and Telecommunications, 2018. | |
[30] | 林代茂, 胡岚, 郭云彪 ,等. 广义信息隐藏技术的机理与模型[J]. 北京邮电大学学报, 2005,28(1): 1-5. |
LIN D M , HU L , GUO Y B ,et al. The mechanism and model of generalized information hiding technology[J]. Journal of Beijing University of Posts and Telecommunications, 2005,28(1): 1-5. | |
[31] | KER A D , . The square root law requires a linear key[C]// The 11th ACM Workshop on Multimedia and Security. 2009: 85-92. |
[32] | PEVNY T , FRIDRICH J . Merging Markov and DCT features for multi-class jpeg steganalysis[C]// Security,Steganography and Watermarking of Multimedia Contents IX. International Society for Optics and Photonics, 2007:650503. |
[33] | 梁小萍, 何军辉, 李健乾 ,等. 隐写分析——原理、现状与展望[J]. 中山大学学报(自然科学版), 2004,43(6): 93-96. |
LIANG X P , HE J H , LI J K ,et al. Steganalysis——principle,actuality and prospect[J]. ACTA Scientiarum Naturalium Universitatis Sunyatseni, 2004,43(6): 93-96. | |
[34] | 胡自权 . 博弈论在信息隐藏中的生存能力研究[D]. 成都:电子科技大学, 2013. 6-8. |
HU Z Q . Research on survivability of hidden information using game theory[D]. Chengdu:University of Electronic Science and Technology of China, 2013. 6-8. | |
[35] | 姚辉灿 . 基于图像的信息掩密技术[D]. 西安:西北工业大学, 2004: 16-22. |
[1] | Dongyan HUANG, Kun LI. Research on multi-address time-based blockchain covert communication method [J]. Journal on Communications, 2023, 44(2): 148-159. |
[2] | Chao XIA, Yaqi LIU, Qingxiao GUAN, Xin JIN, Yanshuo ZHANG, Shengwei XU. Steganalysis of JPEG images using non-linear residuals [J]. Journal on Communications, 2023, 44(1): 142-152. |
[3] | Hui LI, Jiali JIN, Shuyu JIN, Weijiao MA. Text steganography method based on automatic selection coding and dynamic word selection strategy [J]. Journal on Communications, 2022, 43(9): 240-253. |
[4] | Zhili ZHOU, Meimin WANG, Gaobo YANG, Jianyu ZHU, Xingming SUN. Generative steganography method based on auto-generation of contours [J]. Journal on Communications, 2021, 42(9): 144-154. |
[5] | Zhen ZHANG, Jiaming NI, Ye YAO, Lichun GONG, Yujuan WANG, Guohua WU. Text coverless information hiding method based on synonyms expansion and label delivery mechanism [J]. Journal on Communications, 2021, 42(9): 173-183. |
[6] | Guohua WU,Lichun GONG,Lifeng YUAN,Ye YAO. Review of information hiding on Chinese text [J]. Journal on Communications, 2019, 40(9): 145-156. |
[7] | Feng XU,Jia-nan LI,Jian-guo SUN. Research of composite safety protection for digital maps [J]. Journal on Communications, 2016, 37(2): 174-179. |
[8] | Ming-zhu LAI,Li-guo ZHANG,Wei-miao FENG,Yuan-yuan WANG,Yong WANG,Shou-zheng LI. Study on authority watermark of the electronic chart based on the semantics characteristics [J]. Journal on Communications, 2016, 37(11): 137-145. |
[9] | Li-quan CHEN,Miao LU,Ai-qun HU,Xiao-yan SUN. Improved information hiding algorithm based on twice positioning in coding channel [J]. Journal on Communications, 2013, 34(12): 120-130. |
[10] | Jia-yong CHEN,Jiu-fen LIU,Yue-fei ZHU,Wei-ming ZHANG. Cryptographic secrecy of steganographic matrix encoding [J]. Journal on Communications, 2012, 33(6): 174-179. |
[11] | Jian-guo SUN,Guo-yin ZHANG,Jun-peng WU,Ai-hong YAO. Performance verification of the digital watermarking for vector map based on SPA [J]. Journal on Communications, 2010, 31(9A): 239-244. |
[12] | Qiu-yu ZHANG,Yi-bo HUANG,Lan-jun ZHENG. Audio steganography algorithm using PCM quantization coding in the DWT domain [J]. Journal on Communications, 2010, 31(9A): 245-250. |
[13] | Ming CHEN,Ru ZHANG,Fan-fan LIU,Jia WU,Xin-xin NIU. Steganalysis of LSB matching based on regional correlation [J]. Journal on Communications, 2010, 31(3): 1-11. |
[14] | Jian-guo SUN,Chao-guang MEN,Chun-guang MA,Cheng-ming LI. Authentication-based double images fractal watermarking model of vector maps [J]. Journal on Communications, 2009, 30(9): 24-28. |
[15] | Ming CHEN,Ru ZHANG,Fan-fan LIU,Xin-xin NIU,Yi-xian YANG. Audio steganography by quantization index modulation in the DCT domain [J]. Journal on Communications, 2009, 30(8): 105-111. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|