基于级联混沌映射与低位嵌入的图像隐写算法
[1] 黄晓生.数字图像安全技术研究进展[J].华东交通大学学报, 2006, 23(1): 82-86.
HUANG X S. A brief review on security of digital image [J]. Journal of East China Jiaotong University, 2006, 23(1): 82-86. (in Chinese)
[2] 于琛.图像隐藏技术在信息安全中的应用研究[D].青岛: 中国海洋大学, 2006.
YU C. The application of image hiding technique in information security [D]. Qingdao: Ocean University of China, 2006. (in Chinese)
[3] FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps [J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.
[4] WANG X Y, YANG L, LIU R, et al. A chaotic image encryption algorithm based on perceptron model [J]. Nonlinear Dynamics, 2010, 62(3): 615-621.
[5] KANSO A, GHEBLEH M. A novel image encryption algorithm based on a 3D chaotic map [J]. Communications in Nonlinear Science and Numerical Simulation, 2012, 17(7): 2943-2959.
[6] CHEN G R, MAO Y B, CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps [J]. Chaos, Solitons & Fractals, 2004, 21(3): 749-761.
[7] LIU L, ZHANG Q, WEI X P, et al. Image encryption algorithm based on chaotic modulation of Arnold dual scrambling and DNA computing [J]. Journal of Computational and Theoretical Nanoscience, 2011, 4(11/12): 3537-3542.
[8] LAFE O. Data compression and encryption using cellular automata transforms [J]. Engineering Applications of Artificial Intelligence, 1997, 10(6): 581-591.
[9] KEKRE H B, SARODE T, HALARNKAR P N. Partial image scrambling using Walsh sequency in sinusoidal wavelet transform domain [M]//BERRETTI S, THAMPI S M, SRIVASTAVA P R. Intelligent Systems Technologies and Applications. Cham: Springer, 2015: 471-484.
[10] SONG C Y S, QIAO Y L. A novel image encryption algorithm based on DNA encoding and spatiotemporal chaos [J]. Entropy, 2015, 17(12): 6954-6968.
[11] 雷正桥, 肖迪.基于空域可恢复信息隐藏的图像安全人工退化算法[J].计算机科学, 2015, 42(3): 162-166.
LEI Z Q, XIAO D. Artificial image security degradation algorithm based on invertible information hiding in spatial domain [J]. Computer Science, 2015, 42(3): 162-166. (in Chinese)
[12] 穆晓芳, 邓红霞, 李晓宾, 等.基于人工蜂群算法的两阶段图像隐写分析算法[J].计算机科学, 2019, 46(6): 174-179.
MU X F, DENG H X, LI X B, et al. Two-phase Image Steganalysis algorithm based on artificial bee colony algorithm [J]. Computer Science, 2019, 46(6): 174-179. (in Chinese)
[13] 陈嘉勇, 王超, 张卫明, 等.安全的密文域图像隐写术[J].电子与信息学报, 2012, 34(7): 1721-1726.
CHEN J Y, WANG C, ZHANG W M, et al. A secure image Steganographic method in encrypted domain [J]. Journal of Electronics & Information Technology, 2012, 34(7): 1721-1726. (in Chinese)
[14] GUL E, OZTURK S. A novel hash function based fragile watermarking method for image integrity [J]. Multimedia Tools and Applications, 2019, 78(13): 17701-17718.
[15] YAO X M, DU W C, HUANG M, et al. Pattern-based blind spatial image watermarking [C]//Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. Jinggangshan, China: IEEE, 2010.
[16] SU Q T, NIU Y G, WANG Q J, et al. A blind color image watermarking based on DC component in the spatial domain [J]. Optik, 2013, 124(23): 6255-6260.
[18] 王玉海, 朱长青, 苏守宝,等. 结合感知哈希与数字水印的遥感影像认证方法 [J]. 光学 精密工程, 2016, 24(10s): 640-648.
WANG Y H, ZHU C Q, SU S B, et al. An authentication method based on perceptual hashing and watermarking for remote sensing image [J]. Optics and Precision Engineering, 2016, 24(10s): 640-648. (in Chinese)
[19] CARDOSO V, MIRANDA A S, BERTI E, et al. Geodesic stability, Lyapunov exponents, and quasinormal modes [J]. Physical Review D, 2009, 79(6): 064016.
穆俊. 基于级联混沌映射与低位嵌入的图像隐写算法[J]. 液晶与显示, 2020, 35(4): 374. MU Jun. Image steganography algorithm based on cascaded chaotic map and low bits embedding[J]. Chinese Journal of Liquid Crystals and Displays, 2020, 35(4): 374.