[1] BASSIL Y. Steganography & the art of deception: a comprehensive survey [J]. International Journal of Latest Trends in Computing, 2013, 4(3): 128-139. [2] PETITCOLAS F A P, ANDERSON R J, KUHN M G. Information hiding—a survey [J]. Proceedings of the IEEE, 1999, 87(7): 1062-1078. [3] XIA Y, LANG R, CAO W, et al. Studies of information hiding detection in images [J]. Journal of Computer Research and Development,2004, 41(4): 728-736.(夏煜,郎荣玲,曹卫兵,等.基于图像的信息隐藏检测算法和实现技术研究综述[J].计算机研究与发展,2004,41(4):728-736.) [4] FORTRINI M. Steganography and digital watermarking: a global view [EB/OL]. [2014-06-01]. http://www-lia.deis.unibo.it/Courses/RetiDiCalcolatori/Progetti00/fortini/project.pdf. [5] MacWILLIAMS F J, SLOANE N J A. The theory of error correcting codes [M]. New York: North-Holland Publishing, 1977: 1-14. [6] VERON P. Code based cryptography and steganography [C]// CAI 2013: Proceedings of the 5th International Conference on Algebraic Informatics, LNCS 8080. Berlin: Springer, 2013: 9-46. [7] WANG X. Research on channel coding based information hiding techniques [D]. Harbin: Harbin Institute of Technology, 2009.(王晓飞.基于信道编码的信息隐藏技术研究[D].哈尔滨:哈尔滨工业大学,2009.) [8] MSTAFA R J, ELLEITHY K M. A highly secure video steganography using Hamming code (7, 4) [C]// LISAT 2014: Proceedings of the 2014 IEEE Long Island Systems, Applications and Technology Conference. Piscataway: IEEE, 2014:1-6. [9] DIOP I, FARSS S M, TALL K, et al. Adaptive steganography scheme based on LDPC codes [C]// ICACT 2014: Proceedings of the 2014 16th International Conference on Advanced Communication Technology. Piscataway: IEEE, 2014: 162-166. [10] CHEN L, LU M, HU A, et al. Improved information hiding algorithm based on twice positioning in coding channel [J]. Journal on Communications, 2013, 34(12): 120-130.(陈立全,卢苗,胡爱群,等.基于二级定位的编码信道信息隐藏算法[J].通信学报,2013,34(12):120-130.) [11] CRANDALL R. Some notes on steganography [EB/OL]. [2015-02-15]. http://dde.binghamton.edu/download/Crandall_matrix.pdf. [12] YAN X, GUAN S, NIU X. Research on the capacity of error-correcting codes-based information hiding [C]// Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2008: 1158-1161. [13] LIU C, PING X, ZHANG T, et al. A research on steganography method based on error-correcting codes [C]// IIH-MSP 2006: Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2006: 377-380. [14] CACHIN C. An information-theoretic model for steganography [C]// Proceedings of the Second International Workshop on Information Hiding. Berlin: Springer, 1998: 306-318. [15] JIANG X, TANG G. Study on theoretical security of information-hiding based on images [J]. Journal of Computer Applications, 2007, 27(2): 321-323.(蒋小标,汤光明.图像信息隐藏的理论安全性研究[J].计算机应用,2007,27(2):321-323.) |