[1] 沈昌祥, 张焕国, 冯登国. 信息安全综述[J]. 中国科学, 2007, 37(2):129-150. Shen C X, Zhang H G, Feng D G. A survey of information security[J]. Science China, 2007, 37(2):129-150. (in Chinese) [2] Jiang S Z, Ye D P, Huang J Q, et al. Smart steganography:light-weight generative audio steganography model for smart embedding application[J]. Journal of Network and Computer Applications, 2020, 165(7):102689. [3] Tirkel A Z, Rankin G A, Schynsel R V. Electronic watermark[C]//Digital Image Computing, Technology and Applications, 1993:666-673. [4] Yang C H, Weng C Y, Wang S J. Adaptive data hiding in edge areas of images with spatial LSB domain systems[J]. IEEE Transactions on Information Forensics & Security, 2008, 3(3):488-497. [5] Li Z, Chen X P, Pan X Z, et al. Lossless data hiding scheme based on adjacent pixel difference[C]//International Conference on Computer Engineering and Technology, 2009:588-592. [6] Zhang X P, Wang S Z. Steganography using multiple-base notational system and human vision sensitivity[J]. IEEE Signal Process, 2005, 12(1):67-70. [7] Huang F J, Huang J W, Shi Y Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(4):1181-1191. [8] Lin G S, Chang Y T, Lie W N. A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm[J]. IEEE Transactions on Multimedia, 2010, 12(5):345-357. [9] Ruanaidh J K, Dowling W J, Boland F M. Phase watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687. [10] 许德合, 朱长青, 王奇胜. 利用DFT幅度和相位构建矢量空间数据水印模型[J]. 北京邮电大学学报, 2011, 34(5):25-28. Xu D H, Zhu C Q, Wang Q S. A construction of digital watermarking model for the vector geospatial data based on magnitude and phase of DFT[J]. Journal of Beijing University of Posts and Telecommunications, 2011, 34(5):25-28. (in Chinese) [11] Kang Z W, Liu J, He Y G. Steganography based on wavelet transform and modulus function[J]. Journal of Systems Engineering and Electronics, 2007, 18(3):628-632. [12] Hsieh M S, Tseng D C, Huang Y H. Hiding digital watermarks using multiresolution wavelet transform[J]. IEEE Transactions on Industrial Electronics, 2001, 48(5):875-882. [13] Lin W H, Horng S J, Kao T W, et al. An efficient watermarking method based on significant difference of wavelet coefficient quantization[J]. IEEE Transactions on Multimedia, 2008, 10(5):746-757. [14] Zhou Z L, Sun H, Harint R. Coverless image steganography without embedding[C]//Cloud Computing and Security. Springer, 2015:123-132. [15] Zhang X, Peng F, Long M. Robust coverless image steganography based on DCT and LDA topic classification[J]. IEEE Transactions on Multimedia, 2018, 20(12):3223-3238. [16] Yuan C S, Xia Z H, Sun X M. Coverless image steganography based on SIFT and BOF[J]. Journal of Internet Technology, 2017, 18:435-442. [17] Otori H, Kuriyama S. Texture synthesis for mobile data communications[J]. IEEE Conference Graphics Applications, 2009, 29(6):74-81. [18] Otori H, Kuriyama S. Data-embeddable texture synthesis[C]//Proceedings of the 8th International Symposium on Smart Graphics, Kyoto, Japan, 2007:146-157. [19] 潘琳, 钱振兴, 张新鹏. 基于构造纹理图像的数字隐写[J]. 应用科学学报, 2016, 34(5):625-632. Pan L, Qian Z X, Zhang X P. Steganography by constructing texture images[J]. Journal of Applied Sciences, 2016, 34(5):625-632. (in Chinese) [20] 司广文, 秦川, 姚恒, 等. 基于纹理特征分类与合成的鲁棒无载体信息隐藏[J]. 应用科学学报, 2020, 38(3):441-454. Si G W, Qin C, Yao H, et al. Robust coverless data hiding based on texture classification and synthesis[J]. Journal of Applied Sciences, 2020, 38(3):441-454. (in Chinese) [21] Ren S Q, He K M, Girshick R. Faster-RCNN:towards real-time object detection with region proposal networks[C]//International Conference on Neural Information Processing Systems, 2015, 39:91-99. [22] 周志立, 曹燚, 孙星明. 基于图像bag-of-words模型的无载体信息隐藏[J]. 应用科学学报, 2016, 34(5):527-536. Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5):527-536. (in Chinese) [23] Lowe D G. Distinctive image features from scale-invariant key-points[J]. International Journal of Computer Vision, 2004, 60(2):91-110. [24] Zheng S, Wang L, Ling B H, et al. Coverless information hiding based on robust image hashing[C]//International Conference on Intelligent Computing, 2017:1536-1547. |