[1] ALTAAY A A J, SAHIB S B, ZAMANI M. An introduction to image steganography techniques[C]//ACSAT'12:Proceedings of the 2012 International Conference on Advanced Computer Science Applications and Technologies. Piscataway, NJ:IEEE, 2012:122-126. [2] SHELKE S G, JAGTAP S K. A novel approach:pixel matching based image steganography[C]//Proceedings of the 2015 International Conference on Pervasive Computing. Piscataway, NJ:IEEE, 2015:1-4. [3] 罗纲,孙星明.基于文本剩余度的文本隐藏信息检测方法研究[J].通信学报,2009,30(6):20-25.(LUO G, SUN X M. Steganalysis for stegotext based on text redundancy[J]. Journal on Communications, 2009, 30(6):20-25.) [4] 陈铭,张茹,钮心忻,等.隐写分析技术研究概述[J].计算机应用,2008,28(S1):31-33.(CHEN M, ZHANG R, NIU X X, et al. Summarization of steganalysis technology[J]. Journal of Computer Applications, 2008, 28(S1):31-33.) [5] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学:E辑,2007,37(2):129-150.(SHEN C X, ZHANG H G, FENG D G, et al. A survey of information security[J]. Science in China (Series E), 2007, 37(2):129-150.) [6] ZHANG J, LI X G. The application research of information hiding technology in network security[C]//ISISE'09:Proceedings of the 2009 Second International Symposium on Information Science and Engineering. Piscataway, NJ:IEEE, 2009:208-212. [7] BABU R, SRIDHAR M, BABU B R. Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security[C]//Proceedings of the 2013 International Conference on Information Systems and Computer Networks. Piscataway, NJ:IEEE, 2013:195-199. [8] 王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263.(WANG S Z, ZHANG X P, ZHANG W M. Recent advances in image-based steganalysis research[J]. Chinese Journal of Computers, 2009, 32(7):1247-1263.) [9] KER A D. Steganalysis of LSB matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6):441-444. [10] CHAN C K, CHENG L M. Hiding data in images by simple LSB substitution[J]. Pattern Recognition, 2004, 37(3):469-474. [11] MIELIKAINEN J. LSB matching revisited[J]. IEEE Signal Processing Letters, 2006, 13(5):285-287. [12] ZHANG X P, WANG S Z. Efficient steganographic embedding by exploiting modification direction[J]. IEEE Communications Letters, 2006, 10(11):781-783. [13] CHAO R-M, WU H-C, LEE C-C, et al. A novel image data hiding scheme with diamond encoding[J]. EURASIP Journal on Information Security, 2009, 2009:Article ID 658047. [14] HONG W, CHEN T S. A novel data embedding method using adaptive pixel pair matching[J]. IEEE Transactions on Information Forensics and Security, 2012, 7(1):176-184. [15] NANDCHATURVEDI K, DOEGER A. A novel approach for data hiding using LSB on edges of a gray scale cover images[J]. International Journal of Computer Applications, 2014, 86(7):36-40. [16] DESHMUKH P U, PATTEWAR T M. A novel approach for edge adaptive steganography on LSB insertion technique[C]//Proceedings of the 2014 International Conference on Information Communication and Embedded Systems. Piscataway, NJ:IEEE, 2014:1-5. [17] MISHRA R, BHANODIYA P. A review on steganography and cryptography[C]//Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications. Piscataway, NJ:IEEE, 2015:167-173. [18] BRANDT A, MCCORMICK S, RUGE J. Algebraic MultiGrid (AMG) for automatic multigrid solutions with application to geodetic computations[M]. Cambridge:Cambridge University Press, 1982:2-8. [19] DE ZEEUW P M. A multigrid approach to image processing[C]//Proceedings of the 2005 5th International Conference on Scale-Space Theories in Computer Vision, LNCS 3459. Berlin:Springer, 2005:396-407. [20] DUARTE-CARVAJALINO J M, SAPIRO G, VÉLEZ-REYES M, et al. Multiscale representation and segmentation of hyperspectral imagery using geometric partial differential equations and algebraic multigrid methods[J]. IEEE Transactions on Geoscience and Remote Sensing, 2008, 46(8):2418-2434. [21] XU Y P, CHEN H L. An improved model for image denoising[C]//Proceedings of the 2013 IEEE International Conference on Signal Processing, Communication and Computing. Piscataway, NJ:IEEE, 2013:1-4. [22] 黄颖,李伟生,周丽芳,等.代数多重网格方法原理及图像工程应用[M].北京:电子工业出版社,2015:25-41.(HUANG Y, LI W S, ZHOU L F, et al. The Principle of Algebraic Multigrid Method and Its Application in Image Engineering[M]. Beijing:Publishing House of Electronics Industry, 2015:25-41.) [23] ISLAM S, MODI M R, GUPTA P. Edge-based image steganography[J]. EURASIP Journal on Information Security, 2014, 8(1):1-14. [24] 黄颖,解梅,李伟生,等.使用代数多重网格进行多聚焦图像融合[J].电子科技大学学报,2015,44(2):272-277.(HUANG Y, XIE M, LI W S, et al. Research on multi-focus image fusion algorithm based on algebraic multigrid method[J]. Journal of University of Electronic Science and Technology of China, 2015, 44(2):272-277.) [25] WANG Z, BOVIK A C, SHEIKH H R, et al. Image quality assessment:from error visibility to structural similarity[J]. IEEE Transactions on Image Processing, 2004, 13(4):600-612. [26] PETITCOLAS F A P, ANDERSON R J. Evaluation of copyright marking systems[C]//CMCS'99:Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems. Piscataway, NJ:IEEE, 1999:574-579. [27] SULLIVAN K, MADHOW U. CHANDRASEKARAN S, et al. Steganalysis for Markov cover data with applications to images[J]. IEEE Transactions on Information Forensics and Security, 2006, 1(2):275-287. [28] WEBER A G. The USC-SIPI image database version 5[DB/OL].[2016-10-20]. http://sipi.usc.edu/database/. [29] SCHAEFER G, STICH M. UCID:an uncompressed color image database[C]//Proceedings of the SPIE 5307, Storage and Retrieval Methods and Applications for Multimedia 2004. Bellingham:SPIE, 2003:472-480. |