[1] YANG X, WEI K, MA H, et al. Trojan horse attacks on counterfactual quantum key distribution[J]. Physics Letters A, 2016, 380(18/19):1589-1592. [2] 国家互联网应急中心.网络安全信息与动态周报[EB/OL].[2017-10-11]. http://www.cert.org.cn/publish/main/upload/File/2016CNCERT15.pdf. [3] BAO C, FORTE D, SRIVASTAVA A. On reverse engineering-based hardware trojan detection[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(1):49-57. [4] NATH H V, MEHTRE B M. Analysis of a multistage attack embedded in a video file[J]. Information Systems Frontiers, 2015, 17(5):1029-1037. [5] 康治平,向宏.特洛伊木马隐藏技术研究及实践[J].计算机工程与应用,2006,42(9):103-105. (KANG Z P, XIANG H. Research and practice on the concealing technology of Trojan horses[J]. Computer Engineering and Applications. 2006, 42(9):103-105.) [6] ZHANGY Y Q, BI H. Research on machine-code level injection and HOOK technique[J]. Advanced Materials Research, 2011, 159:424-428. [7] 潘勉,薛质,李建华,等.基于DLL技术的特洛伊木马植入新方案[J].计算机工程,2004, 30(18):110-112. (PAN M, XUE Z, LI J H, et al. New scheme for the injection of Trojan horse based on DLL[J]. Computer Engineering, 2004, 30(18):110-112.) [8] 罗改龙,程胜利.基于端口复用技术的木马研究[J].计算机工程,2007,33(15):165-167. (LUO G L, CHENG S L. Research on Trojan horse based on port reuse technology[J]. Computer Engineering, 2007, 33(15):165-167.) [9] 罗红,慕德俊,戴冠中,等.端口反弹型木马的通信技术研究[J].微电子学与计算机,2006,23(2):193-197. (LUO H, MU D J, DAI G Z, et al. Research on communication techniques for port recall Trojan horse[J]. Microelectronics & Computer, 2006, 23(2):193-197.) [10] FAN Y, YE Y, CHEN L. Malicious sequential pattern mining for automatic malware detection[J]. Expert Systems with Applications, 2016, 52(C):16-25. [11] PRELIPCEAN D B, POPESCU A S, GAVRILUT D T. Improving malware detection response time with behavior-based statistical analysis techniques[C]//Proceedings of the 20157th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing. Washington, DC:IEEE Computer Society, 2016:232-239. [12] LIU Y-F, ZHANG L-W, LIANG J, et al. Detecting Trojan horses based on system behavior using machine learning method[C]//Proceedings of the 2010 International Conference on Machine Learning and Cybernetics. Piscataway:IEEE, 2010:855-860. [13] QIN J, YAN H, SI Q, et al. A Trojan horse detection technology based on behavior analysis[C]//Proceedings of the 20106th International Conference on Wireless Communications Networking and Mobile Computing. Piscataway:IEEE, 2010:1-4. [14] VENKATACHALAM N, ANITHA R. A multi-feature approach to detect Stegobot:a covert multimedia social network botnet[J]. Multimedia Tools & Applications, 2017, 76(4):6079-6096. [15] WANG S, SANG J, SONG X, et al. Least significant qubit (LSQb) information hiding algorithm for quantum image[J]. Measurement, 2015, 73:352-359. [16] SHINODA K, WATANABE A, HASEGAWA M, et al. Multispectral information hiding in RGB image using bit-plane-based watermarking and its application[J]. Optical Review, 2015, 22(3):469-476. [17] ZHANG J, SHEN J, WANG L, et al. Coverless text information hiding nethod based on the word rank map[C]//ICCCS 2016:Proceedings of the 2016 International Conference on Cloud Computing and Security, LNCS 10039. Cham:Springer, 2016:145-155. [18] CAO Q, SUN X, XIANG L. A secure text steganography based on synonym substitution[C]//Proceedings of the 13th IEEE Joint International Computer Science and Information Technology Conference. Piscataway:IEEE, 2013:1-3. [19] 周琳娜,杨义先,郭云彪,等.基于二值图像的信息隐藏研究综述[J].中山大学学报(自然科学版),2004,143(S2):71-75. (ZHOU L N, YANG Y X, GUO Y B, HU L. The overview of binary image information hiding[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2004, 143(S2):71-75.) [20] 李丹,高勇.适用于广播信道的时频调制音频隐藏算法[J].四川大学学报(自然科学版),2017,54(2):298-302. (LI D, GAO Y. Audio information hiding algorithm based on time-frequency modulation method applied in broadcast channel[J]. Journal of Sichuan University (Natural Science Edition). 2017, 54(2):298-302.) [21] CHUNG K-L, HUANG Y-H, CHANG P-C, et al. Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC[J]. IEEE Transactions on Circuits & Systems for Video Technology, 2010, 20(11):1643-1647. [22] 张新鹏,钱振兴,李晟.信息隐藏研究展望[J].应用科学学报,2016,34(5):475-489. (ZANG X P, QIAN Z X, LI S. Prospect of digital steganography research[J]. Journal of Applied Sciences, 2016, 34(5):475-489.) [23] JIANG C, PANG Y, GUO L, et al. A high capacity steganographic method based on quantization table modification[J]. Wuhan University Journal of Nature Sciences, 2011, 33(3):1611-1626. [24] PROVOS N. Defending against statistical steganalysis[C]//SSYM'01:Proceedings of the 10th Conference on Usenix Security Symposium. Berkeley, CA:USENIX Association, 2001:24-24. [25] KIM Y, DURIC Z, RICHARDS D. Modified matrix encoding technique for minimal distortion steganography[C]//IH 2006:Proceedings of the 2006 International Workshop on Information Hiding, LNCS 4437. Berlin:Springer, 2006:314-327. [26] WANG C, NI J. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients[C]//Proceedings of the 2012 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE, 2012:1785-1788. [27] HUANG F, HUANG J, SHI Y-Q. New channel selection rule for JPEG steganography[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(4):1181-1191. [28] 程森,张卫民,包震坤,等.基于DCT系数大小关系的自适应JPEG隐写[J].武汉大学学报:理学版,2012,58(6):545-550.(CHENG S, ZHANG W M, BAO Z K, et al. Based the Magnitude of DCT Coefficient Adaptive Steganographic Method for JPEG Images[J]. Journal of Wuhan University (Natural Science Edition), 2012, 58(6):545-550.) [29] COX I J, KILIAN J, LEIGHTON F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 6(12):1673-1687. |