[1] Yang T Y, Chen H S. Matrix embedding in steganography with binary reed-muller codes[J]. IET Image Processing, 2017, 11(7): 522-529.
[2] Mao B H, Wang Z C, Zhang X P. Asymmetric JPEG stega-nography based on correlation in DCT domain[J]. Computer Science, 2019, 46(1): 196-200. 毛炳华, 王子驰, 张新鹏. 基于DCT域相关性的非对称JPEG隐写[J]. 计算机科学, 2019, 46(1): 196-200.
[3] Shao L P, Le Z F. (t, s, k, n) image sharing sheme with multi-version backups and restricted double authentications [J]. Acta Electronica Sinica, 2019, 47(2): 390-403. 邵利平, 乐志芳. 多版本备份和限制性双重认证主密钥(t, s, k, n)图像分存[J]. 电子学报, 2019, 47(2): 390-403.
[4] Su Q T, Chen B J. Robust color image watermarking technique in the spatial domain[J]. Soft Computing, 2018, 22(1): 91-106.
[5] Zhou Z L, Sun H Y, Harit R, et al. Coverless image steganography without embedding[C]//LNCS 9483: Proceedings of the 1st International Conference on Cloud Computing and Security, Nanjing, Aug 13-15, 2015. Berlin, Heidelberg: Springer, 2015: 123-132.
[6] Yuan C S, Xia Z H, Sun X M. Coverless image steganography based on SIFT and BOF[J]. Journal of Internet Technology, 2017, 18(2): 435-442.
[7] Zhou Z L, Cao Y, Sun X M. Coverless information hiding based on bag-of-words model of image[J]. Journal of Applied Sciences, 2016, 34(5): 527-536. 周志立, 曹燚, 孙星明. 基于图像Bag-of-Words模型的无载体信息隐藏[J]. 应用科学学报, 2016, 34(5): 527-536.
[8] Xu J Y, Mao X Y, Jin X G, et al. Hidden message in a deformation-based texture[J]. The Visual Computer, 2015, 31(12): 1653-1669.
[9] Qian Z X, Pan L, Li S, et al. Steganography by constructing marbling texture[C]//LNCS 11066: Proceedings of the 4th International Conference on Cloud Computing and Security, Haikou, Jun 8-10, 2018. Berlin, Heidelberg: Springer, 2018: 428-439.
[10] Qian Z X, Zhou H, Zhang W M, et al. Robust steganography using texture synthesis[C]//Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, China, Nov 21-23, 2016. Berlin, Heidelberg: Springer, 2017: 25-33.
[11] Wu K C, Wang C M. Steganography using reversible texture synthesis[J]. IEEE Transactions on Image Processing, 2015, 24(1): 130-139.
[12] Li G L, Shao L P, Ren P A. Generation information hiding method combining difference clustering and error texture synthesis[J]. Journal of Image and Graphic, 2019, 24(12): 2126-2148. 李国利, 邵利平, 任平安. 差异聚类和误差纹理合成的生成式信息隐藏[J]. 中国图象图形学报, 2019, 24(12): 2126-2148.
[13] Lai I J, Tsai W H. Secret-fragment-visible mosaic image: a new computer art and its application to information hiding[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3): 936-945.
[14] Zhai S Y, Li F, Chang C C, et al. A meaningful scheme for sharing secret images using mosaic images[J]. International Journal of Network Security, 2015, 17(5): 643-649.
[15] Singhavi D G, Chatur P N. A new method for creation of secret- fragment-visible-mosaic image for secure communication[C]//Proceedings of the 2015 International Conference on Innovations in Information, Embedded and Communication Systems, Coimbatore, Mar 19-20, 2015. Piscataway: IEEE, 2015: 1-5.
[16] Liu X K, Yao H, Qin C. Improved reversible image camouflage method based on image block classification threshold optimization[J]. Journal of Applied Sciences, 2018, 36(2): 237-246. 刘小凯, 姚恒, 秦川. 基于图像块分类阈值优化的改进可逆图像伪装[J]. 应用科学学报, 2018, 36(2): 237-246.
[17] Wang Y, Shao L P, Lu H. Generative camouflage method combined with block rotation and photo mosaic[J]. Journal of Image and Graphic, 2020, 25(1): 43-59. 王洋, 邵利平, 陆海. 结合块旋转和马赛克拼图的生成式伪装方法[J]. 中国图象图形学报, 2020, 25(1): 43-59. |