[1] 沈昌祥,张焕国,冯登国. 信息安全综述[J]. 中国科学,2007, 37(2): 129-150. Shen C X, Zhang H G, Feng D G. A survey of information security [J]. Science China, 2007, 37(2): 129-150. (in Chinese)
[2] Tirkel A Z, Rankin G A, Schyndel R V. Electronic watermark [C]//Digital Image Computing, Technology and Applications, 1993.
[3] Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems [J]. IEEE Transactions on Information Forensics & Security, 2008, 3(3): 488-497.
[4] Bender W R, Gruhl D, Morimoto N. Techniques for data hiding [J]. IBM Systems Journal, 1996, 35(3.4): 313-336.
[5] Shi Y Q. Reversible data hiding [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006, 16(3): 354-362.
[6] Ruanaidh J J K O, Dowling W J, Boland F M. Phase watermarking of digital images [C]// International Conference on Image Processing, 1996: 239-242.
[7] 许德合,朱长青,王奇胜. 利用DFT幅度和相位构建矢量空间数据水印模型[J]. 北京邮电大学学 报,2011, 34(5): 25-28.Xu D H, Zhu C Q, Wang Q S. A construction of digital watermarking model for the vector geospatial data based on magnitude and phase of DFT [J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(5): 25-28. (in Chinese)
[8] 司应硕,杨文涛,张森. 基于数字图像的信息隐藏技术研究[J]. 计算机光盘软件与应用,2011, 16: 160-161. Si Y S, Yang W T, Zhang S. Information hidingtechnology research based on digital image [J]. Computer CD Software and Application, 2011, 16: 160-161. (in Chinese)
[9] Cox I J, Kilian J, Leighton F T. Secure spread spectrum watermarking for multimedia [J]. IEEE Transactions on Image Processing, 2010, 6(12): 1673-87.
[10] Hsieh M S, Tseng D C, Huang Y H. Hiding digital watermarks using multiresolution wavelet transform [J]. IEEE Transactions on Industrial Electronics, 2001, 48(5): 875-882.
[11] Lin W H, Horng S J, Kao T W. An efficient watermarking method based on significant difference of wavelet coefficient quantization [J] . IEEE Transactions on Multimedia, 2008, 10(5): 746-757.
[12] Zhou Z, Sun H, Harit R. Coverless image steganography without embedding [C]// Cloud Computing and Security. Springer International Publishing, 2015: 123-132.
[13] Chen X, Sun H, Tobe Y. Coverless information hiding method based on the chinese mathematical expression [C]// Cloud Computing and Security. Springer International Publishing, 2015: 133-143.
[14] Yang J, Jiang Y G, Hauptmann A G. Evaluating bag-of-visual-words representations in scene classification [C]// International Workshop on Workshop on Multimedia Information Retrieval. ACM, 2007: 197-206.
[15] Hartigan J A, Wong M A. A K-means clustering algorithm [J]. Applied Statistics, 2013, 28(1): 100-108.
[16] Lowe D G. Distinctive image features from scale-invariant keypoints [J]. International Journal of Computer Vision, 2004, 60(2): 91-110.
[17] Jegou H, Douze M, Schmid C. Hamming embedding and weak geometric consistency for large scale image search [C]// European Conference on Computer Vision. Springer-Verlag, 2008: 1.1-1.1. |