[1] 雷敬祥. 基于能量权重的信息隐写算法设计与研究[D]. 长安大学, 2016:39-48.
[2] 綦科, 张大方, 谢冬青. 基于帧化采样和小波HMM的三维模型信息隐藏[J]. 计算机辅助设计与图形学学报, 2010, 22(8):1406-1411. Qi Ke, Zhang Dafang, Xie Dongqing. Steganography for 3D model based on frame transform and HMM model in wavelet domain[J]. Journal of Computer-Aided Design and Computer Graphics, 2010, 22(8):1406-1411.
[3] Motwani R, Motwani M, Jr F H. An intelligent learning approach for information hiding in 3D multimedia[C]//International Conference on Future Networks. Sanya:IEEE Computer Society, 2010:447-451.
[4] Jiang R, Hang Z, Zhang W, et al. Reversible data hiding in encrypted 3D mesh models[J]. IEEE Transactions on Multimedia, 2017(99):181-186.
[5] Lee M J, Lee J W, Lee H K. Perceptual watermarking for 3D stereoscopic video using depth information[C]//International Conference on Intelligent Information Hiding & Multimedia Signal Processing. Dalian:IEEE, 2011:81-84.
[6] 张弢, 慕德俊, 任帅, 等. 利用内切球解析的三维模型信息隐藏算法[J]. 西安电子科技大学学报(自然科学版), 2014, 41(2):185-190. Zhang Tao, Mu Dejun, Ren Shuai, et al. Information hiding scheme for 3D models based on skeleton and inscribed sphere analysis[J]. Journal of Xidian University (Natural Science), 2014, 41(2):185-190.
[7] 王新宇, 詹永照. 构造顶点分布特征的三维模型数字水印算法[J]. 计算机辅助设计与图形学学报, 2014, 26(2):272-279. Wang Xinyu, Zhan Yongzhao. A watermarking scheme for three-dimensional models by constructing vertex distribution characteristics[J]. Journal of Computer-Aided Design & Computer Graphics, 2014, 26(2):272-279.
[8] 杨飚, 吕梦琪, 王宜敏, 等. 基于复杂区域多层嵌入的三维模型隐写[J]. 电子测量技术, 2016, 39(12):164-167. Yang Biao, Lü Mengqi, Wang Yiming, et al. Structure complexity based multi-layer steganography for 3D model[J]. Electronic Measurement Technology, 2016, 39(12):164-167.
[9] Carlson N A, Porter J R. On the cardinality of Hausdorff spaces and H-closed spaces[J]. Topology & Its Applications, 2013, 160(1):137-142.
[10] Salimi A, Lowther D A. On the role of robustness in multi-objective robust optimization:application to an IPM motor design problem[J]. IEEE Transactions on Magnetics, 2016, 52(3):1-4.
[11] Sedighizad M, Bafghi H G, Seyfe B. Sensitivity of the secrecy capacity of a wiretap channel to the channel gains with imperfect channel information[C]//2017 Iran Workshop on Communication and Information Theory (IWCIT). Tehran:IEEE, 2017:1-5.
[12] Sruthi S, Vijay A, Jose S, et al. Encryption & decryption of text file and audio using LabVIEW[C]//International Conference on Networks & Advances in Computational Technologies. Thiruvanthapuram:IEEE, 2017:462-466. |