[1] 王家骥. 基于帧内预测模式的HEVC视频信息隐藏方法研究[D]. 宁波: 宁波大学, 2015: 2-84. (WANG J J. Study on information hiding algorithm based on intra prediction modes for HEVC video[D]. Ningbo: Ningbo University, 2015: 2-84.) [2] HAN G J, OHM J R, HAN W J. Overview of the High Efficiency Video Coding (HEVC) standard [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(12): 1649-1668. [3] 张明辉. 基于HEVC的视频水印算法研究[D]. 厦门: 华侨大学, 2016: 9-16. (ZHANG M H. A video watermarking algorithm research based on HEVC[D]. Xiamen: Huaqiao University, 2016: 9-16.) [4] LIN Y C, LI J H. Reversible watermarking for H.264/AVC videos[J]. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2011, 5(6):828. [5] LIU Y, JU L, HU M, et al. A robust reversible data hiding scheme for H.264 without distortion drift[J]. Neurocomputing, 2015, 151(3): 1053-1062. [6] 张明辉, 冯桂. 消除帧内误差传播的HEVC可逆水印算法[J]. 信号处理, 2016, 32(2): 220-226. (ZHANG M H, FENG G. A reversible watermarking algorithm for HEVC intra-coded frames without error propagation[J]. Journal of Signal Processing, 2016, 32(2): 220-226.) [7] WENG S, ZHAO Y, PAN J, et al. Reversible watermarking based on invariability and adjustment on pixel pairs[J]. IEEE Signal Processing Letters, 2008, 15(20): 721-724. [8] 王家骥, 王让定, 李伟, 等. 一种基于帧内预测模式的HEVC视频信息隐藏算法[J]. 光电子·激光, 2014, 25(8): 1578-1585. (WANG J J, WANG R D, LI W, et al. An information hiding algorithm for HEVC based on intra prediction[J]. Journal of Optoelectronics·Laser, 2014, 25(8): 1578-1585.) [9] WANG J J, WANG R D, XU D W, et al. An information hiding algorithm for HEVC based on angle differences of intra prediction mode[J]. Journal of Software, 2015, 10(2): 213-221. [10] 徐健, 王让定, 黄美玲, 等. 一种基于预测模式差值的HEVC信息隐藏算法[J]. 光电子·激光, 2015, 26(9): 1753-1760. (XU J, WANG R D, HUANG M L, et al. A data hiding algorithm for HEVC based on the differences of intra prediction modes[J]. Journal of Optoelectronics·Laser, 2015, 26(9): 1753-1760.) [11] WANG J J, WANG R D, LI W, et al. A large-capacity information hiding method for HEVC video[C]//Proceedings of the 3rd International Conference on Computer Science and Service System. Amsterdam: Atlantis Press, 2014: 139-142. [12] BOSSEN F, BROSS B, FLYNN D, et al. HEVC Complexity and implementation analysis[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2012, 22(12): 1685-1696. [13] ZHANG H, MA Z. Fast intra mode decision for High Efficiency Video Coding (HEVC) [J]. IEEE Transactions on Circuits & Systems for Video Technology, 2014, 24(4): 660-668. [14] 伍冠健, 宋立锋. HEVC快速帧内模式和深度决策算法[J]. 广东工业大学学报, 2015, 32(4): 132-137. (WU G J, SONG L F. Fast intra mode and depth decision algorithm for HEVC[J]. Journal of Guangdong University of Technology, 2015, 32(4): 132-137.) [15] MENG B, AU B. Fast intra-prediction mode selection for 4A blocks in H.264[C]//Proceedings of the 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing. Piscataway, NJ: IEEE, 2003: 389-392. [16] YAN S, HONG L, HE W, et al. Group based fast mode decision algorithm for intra prediction in HEVC[C]//Proceedings of the 2012 IEEE International Conference on Signal Image Technology and Internet Based Systems. Piscataway, NJ: IEEE, 2012: 225-229. [17] 徐辉, 王晓东, 王让定, 等, 基于帧内预测模式的HEVC音视频同步算法[J]. 计算机工程, 2015, 41(12): 241-248. (XU H, WANG X D, WANG R D, et al. Audio-video synchronization algorithm for HEVC Based on intra prediction mode[J]. Computer Engineering, 2015, 41(12): 241-248.) [18] QI H, ZHENG D, ZHAO J. Human visual system based adaptive digital image watermarking[J]. Signal Processing, 2008, 88(1): 174-188. [19] CHANG P C, CHUNG K L, CHEN J J, et al. A DCT/DST-based error propagation-free data hiding algorithm for HEVC intra-coded frames[J]. Journal of Visual Communication and Image Representation, 2013, 25(2): 239-253. [20] CHAO R M, WU H C, LEE C C, et al. A novel image data hiding scheme with diamond encoding[J]. EURASIP Journal on Information Security, 2009, 2009: ArticleID658047. [21] HONG W, CHEN T S. A novel data embedding method using adaptive pixel pair matching[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(1): 176-184. |