[1] 师夏阳,马赛兰,胡永健,等.一种基于像素块的纹理优先自适应隐写算法[J].电子学报,2015,43(6): 1094-1100. Shi Xia-yang,Ma Sai-lan,Hu Yong-jian,et al.A pixel block-based adaptive steganographic algorithm with embedding priority given to image textures[J].Acta Electronica Sinica,2015,43(6): 1094-1100.(in Chinese)
[2] Crandall R.Some notes on steganography[EB/OL].http://www.dia.unisa.it/~ads/corso-security/www/CORSO-0203/steganografia/LINKS%20LOCALI/matrix-encoding.pdf,2015-05-10.
[3] Westfeld A.High capacity despite better steganalysis: F5-a steganographic algorithm[A].Proceedings of the 4th International Workshop on Information Hiding[C].Berlin: Springer-Verlag,2001.2137: 289-302.
[4] Fridrich J,Lisonek P,Soukal D.On steganographic embedding efficiency[A].Proceedings of 8th International Workshop on Information Hiding[C].Berlin: Springer-Verlag,2006.4437: 282-296.
[5] Fridrich J,Filler T.Practical methods for minimizing embedding impact in steganography[A].Proceedings of Security,Steganography,and Watermarking of Multimedia Contents IX,Part of the SPIE-IS&T Electronic Imaging Symposium[C].Bellingham: SPIE Press,2007.6505: 201-215.
[6] Filler T,Judas J,Fridrich J.Minimizing embedding impact in steganography using trellis-coded quantization[A].Proceedings of Media Forensics and Security II,Part of the SPIE-IS&T Electronic Imaging Symposium[C].Bellingham: SPIE Press,2010.7541(1): 175-178.
[7] Filler T,Judas J,Fridrich J.Minimizing additive distortion in steganography using syndrome-trellis codes[J].IEEE Transactions on Information Forensics and Security,2011,6(3): 920-935.
[8] Fridrich J,Soukal D.Matrix embedding for large payloads[J].IEEE Transactions on Information Forensics and Security,2006,3(1): 390-395.
[9] Mao Qian.A fast algorithm for matrix embedding steganography[J].Digital Signal Processing,2014,25: 248-254.
[10] Tian Hui,Qin Jie,Huang Yong-feng,et al.Optimal matrix embedding for voice-over-IP steganography[J].Signal Processing,2015,117: 33-43.
[11] Wang Chao,Zhang Wei-ming,Liu Jiu-fen,et al.Fast matrix embedding by matrix extending[J].IEEE Transactions on Information Forensics and Security,2012,7(1): 346-350.
[12] Gao Yun-Kai,Li Xiao-long,Zeng Tie-yong,et al.Improving embedding efficiency via matrix embedding: a case study[A].Proceedings of 16th IEEE International Conference on Image Processing[C].Washington DC: IEEE Computer Society,2009.109-112.
[13] Wang Jun-jie,Chen Hou-shou.A suboptimal embedding algorithm with low complexity for binary data hiding[A].Proceedings of IEEE International Conference on Acoustics,Speech and Signal Processing[C].Washington DC: IEEE Computer Society,2012.1789-1792.
[14] Wang Jun-jie,Lin Chi-yuan,Chen Hou-shou,et al.A suboptimal embedding algorithm for binary matrix embedding[A].Proceedings of International Symposium on Computer,Consumer and Control[C].Washington DC: IEEE Computer Society,2012.165-168.
[15] Yan Shu-fan,Tang Guang-ming,Sun Yi-feng,et al.A triple-layer steganography scheme for low bit-rate speech streams[J].Multimedia Tools & Applications,2015,74(24): 11763-11782.
[16] Liu Jin,Zhou Ke,Tian Hui.Frame-bitrate-change based steganography for voice-over-IP[J].Journal of Central South University,2014,21(12):4544-4552.
[17] CMU ARCTIC database[DB/OL].http://www.festvox.org/cmu_arctic/,2015-07-22.
[18] 黄永峰,李星.IP语音包的自适应编码和封装算法的研究[J].电子与信息学报,2002,24(12): 1829-1834. Huang Yong-feng,Li Xing.An adaptive voice coding and packeting scheme for IP telephony[J].Journal of Electronics and Information Technology,2002,24(12): 1829-1834.(in Chinese)
[19] ITU-T,P.862.Perceptual evaluation of speech quality (PESQ): An objective method for end-to-end speech quality assessment of narrow-band telephone networks and speech codecs[EB/OL].http://www.itu.int/rec/T-REC-P.862/,2015-06-08. |