[1]Cox I J, Miller M L, Bloom J A. Digital Watermarking[M]. San Francisco, CA: MorganKaufmann, 2002[2]Johnson N F, Katzenbeisser S. A survey of steganographic techniques[C] Proc of Information Hiding. Norwood, MA: Artech House, 2000: 4378[3]丁玮, 齐东旭. 数字图像变换及信息隐藏与伪装技术[J]. 计算机学报, 1998, 21(9): 838843[4]Fridrich J. Steganography in Digital Media: Principles, Algorithms, and Applications[M]. New York: Cambridge University Press, 2009[5]Wang Ying, Moulin P. Perfectly secure steganography: Capacity, error exponents, and code constructions[J]. IEEE Trans on Information Theory, 2008, 54(6): 27062722[6]马宇峰, 吕承民, 宋峰, 等. 一种基于扩频技术的信息隐藏算法研究[C] 中国通信学会学术年会会议录, 北京: 中国通信学会, 2008: 38352[7]Gkizeli M, Pados D A, Medley M J. SINR bit error rate, and Shannon capacity optimized spreadspectrum steganography[C] Proc of ICIP04. Piscataway, NJ: IEEE, 2004: 15611564[8]Gkizeli M, Pados D A, Medley M J. Optimal signature design for spreadspectrum steganography[J]. IEEE Trans on Image Processing, 2007, 16(2): 391405[9]Cox I J, Kilian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997, 6(12): 16731687[10]Cayre F, Fontaine C, Furon T. Watermarking security: Theory and practice[J]. IEEE Trans on Signal Processing, 2005, 53(10): 39763987[11]PerezFreire L, Comesana P, TroncosoPastoriza J R, et al. Watermarking security: A survey[G] LNCS: Trans on Data Hiding and Multimedia Security. Berlin: Springer, 2006[12]PérezFreire L, Comesana P, TroncosoPastoriza J R, et al. Watermarking security: A survey[G] LNCS: Trans on Data Hiding and Multimedia Security I. Berlin: Springer, 2006: 4172[13]PérezFreire L, PérezGonzález F. Spreadspectrum watermarking security[J]. IEEE Trans on Information Forensics and Security, 2009, 4(1): 224[14]Gkizeli M, Pados D A, Batalama S N, et al. Blind iterative recovery of spreadspectrum steganographic messages[C] Proc of ICIP05. Piscataway, NJ: IEEE, 2005: 10981101[15]Li M, Kulhandjian M, Pados D A, et al. On the extraction of spreadspectrum hidden data in digital media[C] Proc of ICC12. Piscataway, NJ: IEEE, 2012: 10311035[16]Bas P, Cayre F. Achieving subspace or key security for WOA using natural or circular watermarking[C] Proc of Workshop on Multimedia & Security. New York: ACM, 2006: 8088[17]Schaefer G, Stich M. UCID: An uncompressed color image database[G] Proc of the Int Society for Optical Engineering. San Jose, CA: SPIE, 2004: 472480[18]USCSIPI image database[OL].[20160404]. http:sipi.usc.edudatabasedatabase.cgi?volume=misc |