共 20 条
- [1] Tzeng C H, Tsai W H., A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement, IEEE Communications Letters, 7, 9, pp. 443-445, (2003)
- [2] Wu Min, Liu Bede, Data hiding in binary image for authentication and annotation, IEEE Transactions on Multimedia, 6, 4, pp. 528-538, (2004)
- [3] Yang Huijuan, Kot A C., Binary image authentication with tampering localization by embedding cryptographic signature and block identifier, IEEE Signal Processing Letters, 13, 12, pp. 741-744, (2006)
- [4] Yang Huijuan, Kot A C., Pattern-based data hiding for binary image authentication by connectivity-preserving, IEEE Transactions on Multimedia, 9, 3, pp. 475-486, (2007)
- [5] Feng Bingwen, Lu Wei, Sun Wei, Secure binary image steganography based on minimizing the distortion on the texture, IEEE Transactions on Information Forensics and Security, 10, 2, pp. 243-255, (2015)
- [6] Zhang Junhong, Lu Wei, Yin Xiaolin, Et al., Binary image steganography based on joint distortion measurement, Journal of Visual Communication and Image Representation, 58, 1, pp. 600-605, (2019)
- [7] Filler T, Judas J, Fridrich J., Minimizing additive distortion in steganography using syndrome-trellis codes, IEEE Transactions on Information Forensics and Security, 6, 3, pp. 920-935, (2011)
- [8] Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)
- [9] Lee C W, Tsai W H., A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability, IEEE Transactions on Image Processing, 21, 1, pp. 207-218, (2011)
- [10] Ghazi M, Salman H M A., Secret sharing scheme based technique for authentication of documents images, Engineering and Technology Journal, 32, 6, pp. 1092-1105, (2014)