吉林大学学报(工学版) ›› 2016, Vol. 46 ›› Issue (6): 2074-2079.doi: 10.13229/j.cnki.jdxbgxb201606042
Previous Articles Next Articles
HAN Jia-ling1, 2, ZHAO Xiao-hui1
CLC Number:
[1] 年桂君,刘鸿石,王丹,等. 彩色照片中隐藏水印信息的分析与实现[J]. 吉林大学学报:工学版,2011,41(1):339-343. Nian Gui-jun, Liu Hong-shi, Wang Dan, et al. Analysis and realization of watermarking hiding in color picture[J]. Journal of Jilin University(Engineering and Technology Edition),2011,41(1):339-343. [2] 武丹,汪国昭. 基于差分扩张和差分平移的无损信息隐藏算法[J]. 吉林大学学报:工学版,2010,40(4):1071-1074. Wu Dan, Wang Guo-zhao. Lossless data hiding based on difference expansion and difference shifting[J]. Journal of Jilin University(Engineering and Technology Edition), 2010,40(4):1071-1074. [3] Fridrich J, Goljan M, Du R. Invertible authentication[C]∥Proceedings of SPIE Photonics West, Security and Watermarking of Multimedia Contents III, San Jose, California, USA, 2001:197-208. [4] Fridrich J, Goljan M, Du R. Inversible authentication watermark for JPEG images[C]∥Proceedings of Information Technology:Coding and Computing, Washington,DC, USA, 2001:223-227. [5] Ni Z C, Shi Y Q, Ansari N. Reversible data hiding[J]. IEEE Transaetions on Circuits and Systems for Video Teehnology,2006,16(3):354-362. [6] 王俊祥,倪江群,潘金伟. 一种基于直方图平移的高性能可逆水印算法[J]. 自动化学报,2012,38(1):88-96. Wang Jun-xiang,Ni Jiang-qun,Pan Jin-wei. A high performance reversible watermarking scheme based on histogram shifting[J]. Acta Automatica Sinica,2012,38(1):88-96. [7] 童学峰,侯海峰,宣国荣,等. 基于直方图对二值图像无损数据隐藏算法的改进[J]. 同济大学学报:自然科学版,2011,39(1):115-120. Tong Xue-feng,Hou Hai-feng,Xuan Guo-rong,et al. Improvement of reversible binary image data hiding by run-length coding and histogram pair[J]. Journal of Tongji University(Natural Science),2011,39(1):115-120. [8] Hong W, Chen T S, Wu M C. An improved human visual system based reversible data hiding method using adaptive histogram modification[J]. Optics Communications,2013,291:87-97. [9] Huang H C, Chang F C. Hierarchy-based reversible data hiding[J]. Expert Systems with Applications,2013,40(1):34-43. [10] 陈莹,朱明. 多子直方图均衡微光图像增强及FPGA实现[J]. 中国光学,2014,7(2):225-233. Chen Ying, Zhu Ming. Multiple sub-histogram equalization low light level image enhancement and realization on FPGA[J]. Chinese Optics,2014,7(2):225-233. [11] Leung H Y, Cheng L M, Liu F, et al. Adaptive reversible data hiding based on block median preservation and modification of prediction errors[J]. Journal of Systems and Software,2013,86(8):2204-2219. [12] Li Jian, Li Xiao-long, Yang Bin. Reversible data hiding scheme for color image based on prediction-error expansion and cross-channel correlation[J]. Signal Processing,2013,93(9):2748-2758. [13] Tseng H W, Hsieh C P. Prediction-based reversible data hiding[J]. Information Science,2009,179(14):2460-2469. [14] Lee C F, Chen H L. Adjustable prediction-based reversible data hiding[J]. Digital Signal Processing, 2012,22(6):941-953. |
[1] | LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850. |
[2] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[3] | JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866. |
[4] | ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872. |
[5] | LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878. |
[6] | OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570. |
[7] | LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599. |
[8] | GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605. |
[9] | LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613. |
[10] | CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628. |
[11] | ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223. |
[12] | HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230. |
[13] | FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236. |
[14] | CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243. |
[15] | HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253. |
|