Journal of Guangxi Normal University(Natural Science Edition) ›› 2016, Vol. 34 ›› Issue (2): 67-73.doi: 10.16088/j.issn.1001-6600.2016.02.010
Previous Articles Next Articles
YU Chunqiang1,2, FU Rui3, CHEN Yan1,2, LEI Yun2,4, ZHANG Xianquan1,2,3, WANG Xiaoyun5
CLC Number:
[1] 沈昌祥,张焕国,冯登国,等.信息安全综述[J].中国科学 E 辑:信息科学,2007,37(2):129-150. [2] ZHAO Qi, KOCH C. Learning saliency-based visual attention:A review[J]. Signal Processing, 2013, 93(6):1401-1407. DOI:10.1016/j.sigpro.2012.06.014. [3] GOFERMAN S, ZELNIK-MANOR L, TAL A. Context-aware saliency detection[C] //2010 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway, NJ:IEEE Press, 2010:2376-2383. DOI:10.1109/CVPR.2010.5539929. [4] CHENG Mingming ZHANG Guoxin, MITRA N J, et al. Global contrast based salient region detection[C] //2011 IEEE Conference on Computer Vision and Pattern Recognition. Piscataway, NJ:IEEE Press, 2011:409-416. DOI: 10.1109/CVPR.2011.5995344. [5] ADVANI S, SUSTERSIC J, IRICK K, et al. A multi-resolution saliency framework to drive foveation[C] //2013 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE Press, 2013:2596-2600. DOI:10.1109/ICASSP.2013.6638125. [6] BENDER W, GRUHL D, MORIMOTO N, et al. Techniques for data hiding[J]. IBM Systems Journal, 1996, 35(3/4):313-336. DOI:10.1147/sj.353.0313. [7] 张显全,祝英俊,孙容海,等,基于位平面的彩色图像大容量信息隐藏方法[J]. 光电子·激光, 2009, 20(8):1092-1095. DOI:10.16136/j.joel.2009.08.022. [8] ZHANG Xianquan, TANG Zhenjun, LIANG Tao, et al. Data hiding method based on local image features[M] //Active Media Technology: Lecture Notes in Computer Science Vol 7669. Berlin: Springer, 2012:247-256. DOI: 10.1007/978-3-642-35236-2_25. [9] LIN Y K. A data hiding scheme based upon DCT coefficient modification[J]. Computer Standards & Interfaces,2014,36(5):855-862. DOI:10.1016/j.csi.2013.12.013. [10] SHEN Shuyuan, HUANG Lihong. A data hiding scheme using pixel value differencing and improving exploiting modification directions[J]. Computers & Security,2015,48:131-141. DOI:10.1016/j.cose.2014.07.008. [11] 张鸿宾, 杨成.图像的自嵌入及窜改的检测和恢复算法[J]. 电子学报, 2004, 32(2):196-199. [12] QIN Chuan, CHANG Chinchen, CHEN Peiyu. Self-embedding fragile watermarking with restoration capability based on adaptive bit allocation mechanism[J]. Signal Processing, 2012,92(4):1137-1150. DOI:10.1016/j.sigpro.2011.11.013. [13] KORUS P, DZIECH A. Efficient method for content reconstruction with self-embedding[J]. IEEE Transaction on Image Processing, 2013, 22(3):1134-1147. DOI:10.1109/TIP.2012.2227769. |
[1] | ZHOU Ronglong,LUO Yuling,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian. Applications of Image Parallel Encryption Algorithm in Handheld Devices [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(3): 60-70. |
[2] | SUN Ronghai, SHI Linfu, HUANG Liyan, TANG Zhenjun, YU Chunqiang. Reversible Data Hiding Based on Image Interpolation and Reference Matrix [J]. Journal of Guangxi Normal University(Natural Science Edition), 2019, 37(2): 90-104. |
[3] | YU Chunqiang, DENG Fangzhou, ZHANG Xianquan, TANG Zhenjun, CHEN Yan, HE Nan. A Reversible Information Hiding Method Based on Multiple Prediction Values [J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(2): 24-32. |
[4] | ZOU Hua,LIU Huarong,MEI Ping. Interaction between Carbon Quantum Dots and Human Serum Albumin [J]. Journal of Guangxi Normal University(Natural Science Edition), 2017, 35(2): 101-107. |
[5] | ZHANG Xian-quan, WANG Xian-hui, WANG Xiao-yun, YUChun-qiang. Information Hiding Algorithm for JPEG Images Based on Block [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(3): 119-124. |
|