参考文献/References:
1 Bender W, Gruhl N, Lu A M. T echniques for data hiding. IBM Systems Journal, 1996, 35( 3& 4) : 313~ 336
2 Fr idrich J. Symmetric ciphers based o n two-dimensional chaotic maps. Inter national Journal of B-i furcat ion and Chaos, 1998, 8( 6) : 1 259~ 1 284
3 Hartung F, Kutter M. Multimedia watermarking techniques. Pro ceedings of the IEEE, 1999,87( 7) : 1 079~ 1 107
4 Sw anson M D, Kobay ashi M, Tewfik A H. Multimedia data- embedding and w atermar king technologies.Proceedings of the IEEE, 1998, 86( 6) : 1 064~ 1 087
相似文献/References:
[1]谢建全,谢勍,黄大足,等.一种抗JPEG压缩的大容量信息隐藏算法[J].南京理工大学学报(自然科学版),2011,(02):257.
XIE Jian-quan,XIE Qing,HUANG Da-zu,et al.High Capacity Information Hiding Algorithm Resisting to JPEG[J].Journal of Nanjing University of Science and Technology,2011,(02):257.
[2]张湛,刘光杰,王俊文,等.图像预测误差域的动态补偿安全隐写算法[J].南京理工大学学报(自然科学版),2010,(02):187.
ZHANG Zhan,LIU Guang-jie,WANG Jun-wen,et al.Dynamic Compensation Secure Steganographic Algorithm in Prediction-error Domain[J].Journal of Nanjing University of Science and Technology,2010,(02):187.
[3]朱保平,钱坤,刘凤玉,等.基于YCbCr模型和传统ARQP算法的信息隐藏算法[J].南京理工大学学报(自然科学版),2009,(04):427.
ZHU Bao-ping,QIAN Kun,LIU Feng-yu.Algorithm of Steganography Based on YCbCr Model and Traditional ARQP Algorithm[J].Journal of Nanjing University of Science and Technology,2009,(02):427.
[4]刘春庆,王执铨.一种安全的隐秘通信系统方案[J].南京理工大学学报(自然科学版),2004,(02):113.
LIU Chun-qing,WANG Zhi-quan.Secure Scheme of Steganographic System[J].Journal of Nanjing University of Science and Technology,2004,(02):113.
[5]戴跃伟,卓成春,茅耀斌,等.一种二值混沌加密序列的产生及其性能分析[J].南京理工大学学报(自然科学版),2001,(05):528.
DaiYuewei ZhuoChengchun MaoYaobin WangZhiquan.A Scheme to Produce Chaotic Binary Sequences and Its Property Analysis[J].Journal of Nanjing University of Science and Technology,2001,(02):528.