参考文献/References:
[1] Shapiro J M.Embedded image coding using zerotrees of wavelet coefficients[J].IEEE Transaction on Signal Processing,1993,41(12):3445-3462.
[2] Spaulding J,Noda H,Shirazi M N,et al.BPCS steganography using EZW lossy compressed images[J]. Pattern Recognition Letters,2002,23(13):1579-1587.
[3] Pla O G,Lin E T,Delp E J.A wavelet watermarking algorithm based on a tree structure[C] //Proceedings of SPIE,Security,Steganography and Watermarking of Multimedia Contents VI.San Jose,CA,2004:571-580.
[4] 郭越,程景云.基于视觉感知与EZW的自适应公开水印算法[J].复旦学报:自然科学版,2004.43(5):907-909.
Guo Yue,Cheng Jingyun.Algorithm of adaptive watermarking based on HVS and EZW,[J]. Journal of Fudan University:Natural Science,2004,43(5):907-909.(in Chinese)
[5] 翁洁琼,张志浩,来可伟.一种复合型自适应数字水印算法[J].计算机应用,2005,25(3):557-562.
Weng Jieqiong,Zhang Zhihao,Lai Kewei.An algorithm of compound adaptive digital watermarking[J]. Computer Applications,2005,25(3):557-562.(in Chinese)
[6] Kwak W G,Park R H.Data hiding using bit repetition in the wavelet significant tree structure[C] //Proceedings of IASTED International Conference Signal and Image Processing.Malaga,Spain,2002:520-524.
[7] Michiharu N,Richard O,Hideki N,et al.Intensity histogram steganalysis in BPCS-steganography[C] //Proceedings of SPIE,Security,Steganography and Watermarking of Multimedia Contents Ⅲ.San Jose,CA,2001:555-564.
[8] Yu X Y,Tan T N,Wang Y H.Reliable detection of BPCS-steganography in natural images[C] //Proceedings of the 3rd International Conference on Image and Graphics.Hong Kong,China,2004:333-336.
[9] Cachin C.An information-theoretic model for steganography[J]. Information and Computation,2004,192(1):41-56.
[10] Provos N.Defending against statistical steganalysis[C] //Proceedings of 10th USENIX Security Symposium.Washington DC,USA,2001:323-336.
[11] Solanki K,Sullivan K,Madhow U,et al.Statistical restoration for robust and secure steganography[C] //Proceedings of IEEE International Conference on Image Processing.Genoa,Italy,2005:1118-1121.
[12] Eggers J J,Bauml R,Girod B.A communications approach to image steganography[C] //Proceedings of SPIE:Security and Watermarking of Multimedia Contents IV.San Jose,CA,2002:26-37.
[13] Sallee P.Model-based steganography[C] //Proceedings of International Workshop on Digital Watermarking,LNCS2939.Soul,Korea,2004:154-167.
[14] Zhang X P,Wang S Z,Zhang K W.Steganography with least histogram abnormality[C] //Proceedings of International Workshop on Mathematical Methods,Models,and Architectures for Computer Network Security,LNCS2776.Shanghai,China,2003:395-406.
[15] Bohme R,Westfeld A.Breaking cauchy Model-based steganography with first order statistics[C] //Proceedings of 9th European Symposium on Research in Computer Security,LNCS3193.Riviera,France,2004:125-140.