1. School of Electronics and Computer Science and Technology, North University of China, Taiyuan Shanxi 030051, China
2. School of Computer and Software, Taiyuan University of Technology, Taiyuan Shanxi 030024, China
[1] SIMMONS G J. The prisoners' problem and the subliminal channel [C]// Proceeding IEEE Workshop Communications Security CRYPTO'83. Santa Barbara, CA: [s.n.], 1983: 51-67.[2] 刘粉林,刘九芬,罗向阳,等.数字图像隐写分析[M].北京:机械工业出版社,2010:6-7.[3] 王朔中,张新鹏,张卫明.以数字图像为载体的隐写分析研究进展[J].计算机学报,2009,32(7):1247-1263.[4] CHANDARMOULI R, MEMON N D. Steganography capacity: A steganalysis perspective [C]// Proceedings of SPIE Security and Watermarking of Multimedia. Bellingham, WA: SPIE, 2003: 173-177.[5] KER A D. A capacity result for batch steganography [J]. Signal Processing Letters, 2007, 14(8): 525-528.[6] PEVNY T, FRIDRICH J. Benchmarking for steganography [M]// Information Hiding. Berlin: Springer-Verlag, 2008: 251-267.[7] 丁一军,郑雪峰,于桂荣.一种图像隐蔽通信的安全模型[J].计算机科学,2010,27(2):120-122.[8] CACHIN C. An information-theoretic model for steganography [C]// IH'98: Proceedings of the 2nd International Workshop on Information Hiding, LNCS 1525. Berlin: Springer-Verlag, 1998: 306-318.[9] 王耀南,李树涛,毛建旭.计算机图像处理与识别技术[M].北京:高等教育出版社,2000.[10] 王森,杨克俭.基于双线性插值的图像缩放算法的研究与实现[J].自动化技术与应用,2008,27(7):44-45.