1 |
管萌萌, 曹纭, 张怡暄, 等.. 基于自适应奇异值调制的抗转码视频隐写算法. 信息安全学报, 2018, 3 (6): 42- 54.
|
2 |
ALHASANY R M, JAWAD L M.. A new technique for determining region of interest in selective video protection approach. Iraqi Journal of Information and Communications Technology, 2021, 4 (2): 33- 49.
|
3 |
CAO M Y, TIAN L H, LI C.. A secure video steganography based on the intra-prediction mode (IPM) for H264. Sensors, 2020, 20 (18): 5242.
|
4 |
LIU Y, NI J Q, ZHANG W Z, et al.. A novel video steganographic scheme incorporating the consistency degree of motion vectors. IEEE Transactions on Circuits and Systems for Video Technology, 2022, 32 (7): 4905- 4910.
|
5 |
PATEL R, LAD K, PATEL M. A robust video steganography over DCT components of motion region in compressed domain [C]// Soft Computing and Signal Processing. 2021: 363-374.
|
6 |
HACIMURTAZAOGLU M, TUTUNCU K.. LSB-based pre-embedding video steganography with rotating & shifting poly-pattern block matrix. PeerJ Computer Science, 2022, 8, e843.
|
7 |
SONDAS A, KURNAZ H.. HNMH: A new Hybrid approach based on Near Maximum Histogram and LSB technique for image steganography. Wireless Personal Communications, 2022, 126 (3): 2579- 2595.
|
8 |
HARB S, AHMAD M O, SWAMY M N S.. An efficient image steganographic scheme for a real-time embedded system and its hardware implementation on AMD Xilinx Zynq-7000 APSoC platform. Journal of Real-Time Image Processing, 2023, 20 (3): 46.
|
9 |
RAMALINGAM M, ISA N A M, PUVIARASI R.. A secured data hiding using affine transformation in video steganography. Procedia Computer Science, 2020, 171, 1147- 1156.
|
10 |
SAHU A, PRADHAN C. A novel image steganography technique using AES encryption in DCT domain [C]// Distributed Computing and Intelligent Technology. 2023: 349-354.
|
11 |
SRINIVASU L N, VEERAMANI V.. Steganography using wavelet transform for secured data transmission. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (7): 9509- 9527.
|
12 |
QASAIMEH M, DENOLF K, LO J, et al. Comparing energy efficiency of CPU, GPU and FPGA implementations for vision kernels [C]// 2019 IEEE International Conference on Embedded Software and Systems. 2019: 1-8.
|
13 |
RAMALINGAM B, AMIRTHARAJAN R, RAYAPPAN J B B. Stego on FPGA: An IWT approach[J]. The Scientific World Journal, 2014, 2014: 192512.
|
14 |
SHET K S, ASWATH A R, HANUMANTHARAJU M C, et al.. Novel high-speed reconfigurable FPGA architectures for EMD-based image steganography. Multimedia Tools and Applications, 2019, 78 (13): 18309- 18338.
|
15 |
张铮, 王艳平, 薛桂香. 数字图像处理与机器视觉: Visual C++与 Matlab 实现[M]. 北京: 人民邮电出版社, 2010.
|
16 |
CHEN B, WORNELL G W.. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory, 2001, 47 (4): 1423- 1443.
|
17 |
PHADIKAR A, MAITY S P.. Data hiding based quality access control of digital images using adaptive QIM and lifting. Signal Processing: Image Communication, 2011, 26 (10): 646- 661.
|
18 |
JIANG Y L, ZHANG Y F, PEI W J, et al.. Adaptive spread transform QIM watermarking algorithm based on improved perceptual models. AEU-International Journal of Electronics and Communications, 2013, 67 (8): 690- 696.
|
19 |
MITEKIN V, FEDOSEEV V.. A new QIM-based watermarking algorithm robust against multi-image histogram attack. Procedia Engineering, 2017, 201, 453- 462.
|
20 |
FAN P Q, ZHANG H, ZHAO X F.. Adaptive QIM with minimum embedding cost for robust video steganography on social networks. IEEE Transactions on Information Forensics and Security, 2022, 17, 3801- 3815.
|
21 |
LI J H, WANG H X, YANG L, et al. DST-based video watermarking robust to lossy channel compression [C]// 2022 IEEE 24th International Workshop on Multimedia Signal Processing. 2022: 1-6.
|