[1] |
Fu Zhangjie, Li Enlu, Cheng Xu, Huang Yongfeng, Hu Yuting.
Recent Advances in Image Steganography Based on Deep Learning
[J]. Journal of Computer Research and Development, 2021, 58(3): 548-568.
|
[2] |
Ding Xuyang, Xie Ying, Zhang Xiaosong.
Evolutionary Multi-Objective Optimization Image Steganography Based on Edge Computing
[J]. Journal of Computer Research and Development, 2020, 57(11): 2260-2270.
|
[3] |
Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju.
Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network
[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261.
|
[4] |
Gao Zhanzhan, Tang Guangming, Wang Shuo.
A Novel VoIP Steganography Method Based on Bayesian Network and Matrix Embedding
[J]. Journal of Computer Research and Development, 2018, 55(4): 854-863.
|
[5] |
Wang Lina, Wang Kaige, Xu Yibo, Tang Benxiao, Tan Xuanze.
An Evaluation of Carrier Security for Image Steganography Based on Residual Co-Occurrence Probability
[J]. Journal of Computer Research and Development, 2018, 55(12): 2664-2673.
|
[6] |
Han Tao1,2, Zhu Yuefei1,2, Lin Sisi3, and Wu Yang1,2.
Modified Matrix Encoding Based on the Spatial Distortion Model and Its Improvement
[J]. 计算机研究与发展, 2014, 51(7): 1467-1475.
|
[7] |
Xiong Gang, Ping Xijian, Zhang Tao, and Li Kan.
Steganalysis of LSB Matching Based on the Measurement of the Region Randomness
[J]. , 2013, 50(5): 942-950.
|
[8] |
Qi Ke, and Xie Dongqing.
Steganalysis of Color Images Based on Noise Model and Channels Integration
[J]. , 2013, 50(2): 307-318.
|
[9] |
Zhang Zhan, Liu Guangjie, Dai Yuewei, and Wang Zhiquan.
A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model
[J]. , 2012, 49(8): 1668-1675.
|
[10] |
Yang Chunfang, Liu Fenlin, and Luo Xiangyang.
Histograms Difference and Quantitative Steganalysis of JPEG Steganography Based on Relative Entropy
[J]. , 2011, 48(8): 1563-1569.
|
[11] |
Qian Yuwen, Zhao Bangxin, Kong Jianshou, and Wang Zhiquan.
Robust Covert Timing Channel Based on Web
[J]. , 2011, 48(3): 423-431.
|
[12] |
Yu Jiande, Song Ruixia, and Qi Dongxu, .
A Scheme for Steganography Based on Triangular Partition of Digital Images
[J]. , 2009, 46(9): 1432-1437.
|
[13] |
Luo Gang, Sun Xingming, Xiang Lingyun, Liu Yuling, and Gan Can.
Steganalysis on Synonym Substitution Steganography
[J]. , 2008, 45(10): 1696-1703.
|
[14] |
Sun Xingming, Huang Huajun, Wang Baowei, Sun Guang, and Huang Junwei .
An Algorithm of Webpage Information Hiding Based on Equal Tag
[J]. , 2007, 44(5): 756-760.
|
[15] |
Liu Wenfen, Guan Wei, Cao Jia, and Zhang Weiming.
Detection of Secret Message in Spatial LSB Steganography Based on Contaminated Data Analysis
[J]. , 2006, 43(6): 1058-1064.
|