Citation: Pengcheng Cao, Weiwei Liu, Guangjie Liu, Jiangtao Zhai, Xiaopeng Ji, Yuewei Dai. Steganographic coding scheme based on dither convolutional trellis under resampling mechanism[J]. Mathematical Biosciences and Engineering, 2019, 16(5): 6015-6033. doi: 10.3934/mbe.2019301
[1] | L. Li, X. Yuan, Z. Lu, et al., Rotation invariant watermark embedding based on scale-adapted characteristic regions, Inform. Sci., 180(2010), 2875–2888. |
[2] | M. Amirmazlaghani, M. Rezghi and H. Amindavar, A novel robust scaling image watermarking scheme based on Gaussian Mixture Model, Expert Systems Appl., 42(2014), 1960–1971. |
[3] | B. K. Vivekananda, I. Sengupta and A. Das, An adaptive audio watermarking based on the singular value decomposition in the wavelet domain, Digit. Signal Process., 20(2010), 1547–1558. |
[4] | L. Li, J. Qian and J. S. Pan, Characteristic region based watermark embedding with RST invariance and high capacity, AEUE - Int. J. Electron. C., 65(2011), 435–442. |
[5] | X. Wang, P. Wang, Z. Peng, et al., A norm-space, adaptive, and blind audio watermarking algorithm by discrete wavelet transform, Signal Process., 93(2013), 913–922. |
[6] | D. Avci, T. Tuncer and E. Avci, A new information hiding method for audio signals, Digit. Forens. Secur., (2018), 1–4. |
[7] | M. A. Nematollahi, S. A. R. Al-Haddad and F. Zarafshan, Blind digital speech watermarking based on Eigen-value quantization in DWT, J. King Saud University - Computer and Inform. Sci., 27(2015), 58–67. |
[8] | B. Lei, I. Song and S. A. Rahman, Robust and secure watermarking scheme for breath sound, J. Systems Software, 86(2015), 80–94. |
[9] | B. Lei, Z. Feng, E. L. Tan, et al., Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform, Signal Process., 113(2015), 80–94. |
[10] | B. Han and J. Li, Medical image watermarking in sub-block three-dimensional discrete cosine transform domain, Int. J. Bioautomat., (2016). |
[11] | X. Jia, Y. Qi, L. Shao, et al., A watermark algorithm based on SVD and image geometric correc-tion, Int. Conference Systems Inform., (2012). |
[12] | M. Nutzinger and J. Wurzer, A novel phase coding technique for steganography in auditive media, ARES, 6(2011), 91–98. |
[13] | K. U. Singh, A survey on audio steganography approaches, Int. J. Computer Appl., 95(2014), 7–14. |
[14] | J. Zhao, Robust image watermarking algorithm based on radon and analytic Fourier-Mellin transforms, Open Automat. Control Systems J., 7(2015), 1071–1074. |
[15] | Y. Zhang, X. Luo, Y. Guo, et al., Zernike moment-Based spatial image steganography resisting scaling attack and statistic detection, IEEE Access, (2019). |
[16] | J. Wang, T. Li, X. Luo, et al., Identifying computer generated images based on quaternion central moments in color quaternion wavelet domain, IEEE Transact. Circu. Syst. Video Technol., DOI: 10.1109/TCSVT.2018.2867786. |
[17] | T. Filler, J. Judas and J. Fridrich, Minimizing embedding impact in steganography using trellis-coded quantization, IS&T/SPIE Electron. Imag., (2010). |
[18] | T. Filler, J. Judas and J. Fridrich, Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transact. Inform. Forens. Secur., 6(2011), 920–935. |
[19] | R. G. Keys, Cubic convolution interpolation for digital image processing, IEEE Transact. Acoust. Speech Signal Process., 29(1981), 1153–1160. |
[20] | T. M. Lehmann, C. Gnner and K. Spitzer, Survey: Interpolation methods in medical image processing, IEEE Transact. Med. Imag., 18(1999), 1049–1075. |
[21] | J. Shi and S. E. Reichenbach, Image interpolation by two-dimensional parametric cubic convolu-tion, IEEE Transact. Image Process., 15(2006), 1857–1870. |
[22] | J. A. Parker, R. V. Kenyon and D. Troxel, Comparison of Interpolating Methods for Image Resampling, IEEE Transact. Med. Imag., 2(1983), 31–39. |
[23] | W. Liu, G. Liu and Y. Dai, Damageresistance matrix embedding framework: the contradiction between robustness and embedding efficiency, Secur. Commun. Networks, 8(2015), 1636–1647. |
[24] | Y. Long and Y. Huang, Image based source camera identification using demosaicking, IEEE Workshop Mult. Signal Process., (2016), 419–424. |
[25] | A. Swaminathan, M. Wu and K. J. R. Liu, Nonintrusive component forensics of visual sensors using output images, IEEE Transact. Inform. Forens. Secur., 2(2017), 91–106. |
[26] | P. Bas, T. Filler and T. Pevn, Break Our Steganographic System: The Ins and Outs of Organizing BOSS, J. Am. Statist. Associat., 96(2011), 488–499. |
[27] | V. Holub, J. Fridrich and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP J. Inform. Secur., 2014(2014), 1–13. |
[28] | T. Denemark, V. Sedighi, V. Holub, et al., Selection-channel-aware rich model for steganalysis of digital images, IEEE Int. Workshop Inform. Forens. Secur., (2014), 48–53. |
[29] | J. Kodovsk, J. Fridrich and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Transact. Inform.n Forens. Secur., 7(2012), 432–444. |