参考文献/References:
[1] Sharp T. An implementation of key-based digital signal steganography[C]// Proceedings of the 4th International Workshop on Information Hiding. Pittsburgh(USA): IEEE Press, 2001, 2137: 13-26.
[2] Eusuff M M, Lansey K E. Optimization of water distribution network design using the shuffled frog leaping algorithm[J]. Journal of Water Sources Planning and Management, 2003, 129(3): 210-225.
[3] Hateme, Emad E, Tarek H, et al. Comparison of two evolutionary algorithms for optimization of bridge deck repairs[J]. Computer-Aided Civil and Infrastructure Engineering, 2006, 21: 561-572.
[4] Deb K, Pratab A, Agrawal S, et al. A fast and elitist non-dominated sorting genetic algorithm for multi-objective optimization: NSGA-II[J]. IEEE Transcations on Evolutionary Computation, 2002, 6(2): 182-197.
[5] SHI Rui-feng, ZHOU Hong, TAN Xiao-wei. A multi-objective genetic algorithm based on escalating strategy[J]. Systems Engineering Theory and Practice, 2005, 25(12): 48-56.(in Chinese)
师瑞峰,周泓,谭小卫. 递进多目标遗传算法[J]. 系统工程理论与实践, 2005, 25(12): 48-56.
[6] ZHAO Liang,JU Gang,LU Jian-hong. An improved genetic algorithm in multi-objective optimization and its application[J]. Proceedings of the CSEE, 2008, 28(2): 96-102.(in Chinese)
赵亮, 雎刚, 吕剑虹. 一种改进的遗传多目标优化算法及其应用[J]. 中国电机工程学报, 2008, 28(2): 96-102.
[7] Ker A D. Steganalysis of lsb matching in grayscale images[J]. IEEE Signal Processing Letters, 2005, 12(6): 441-444.
[8] Li X, Zeng T. Detecting lsb matching by applying calibration technique for difference image[C]// Proceedings of 10th ACM Workshop on Multimedia and Security. Oxford(UK): ACM Press, 2008: 133-138.
[9] Mitrinovic D S, Pecaric J E, Fink A M. Classical and New Inequalities in Analysis[M]. Dordrecht(Netherlands): Kluwer Academic Publishers, 1993.
[10] United States Department of Agriculture. Natural resources conservation service photo gallery[DB/OL]http://photogallery.nrcs.usda.gov, 2002.
[11] LIU Guang-jie, ZHANG Zhan. Improved LSB-matching steganography for preserving second-order statistics[J]. Journal of Multimedia, 2010, 5(5):458-463.
[12] Xuan G, Shi Y, Gao J, et al. Steganalysis based on multiple features formed by statistical moments of wavelet characteristic functions[J].Computer Science, 2005, 3727: 262-265.
相似文献/References:
[1]张席,陈泯融,刘浩.无需随机预言模型的基于身份门限解密方案[J].深圳大学学报理工版,2010,27(3):340.
ZHANG Xi,CHEN Min-rong,and LIU Hao.Practical identity-based threshold decryption scheme without random oracle[J].Journal of Shenzhen University Science and Engineering,2010,27(No.3(189-282)):340.
[2]张席,陈泯融,杨玲.基于身份多接收者签密方案的安全性分析[J].深圳大学学报理工版,2010,27(4):408.
ZHANG Xi,CHEN Min-rong,and YANG Ling.Cryptanalysis of an identity-based multi-recipient signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2010,27(No.3(189-282)):408.
[3]张席,刘浩.安全签密方案在嵌入式设备中的应用[J].深圳大学学报理工版,2011,28(No.5(377-470)):417.
ZHANG Xi and LIU Hao.The application in embedded device of a security signcryption scheme[J].Journal of Shenzhen University Science and Engineering,2011,28(No.3(189-282)):417.
[4]张鹏,喻建平,刘宏伟.同态签密方案及其在电子投票中的应用[J].深圳大学学报理工版,2011,28(No.6(471-564)):489.
ZHANG Peng,YU Jian-ping,and LIU Hong-wei.A homomorphic signcryption scheme and its application in electronic voting[J].Journal of Shenzhen University Science and Engineering,2011,28(No.3(189-282)):489.
[5]颜海龙,闫巧,冯纪强,等.基于PKI/CA互信互认体系的电子政务[J].深圳大学学报理工版,2012,29(No.2(095-188)):113.[doi:10.3724/SP.J.1249.2012.02113]
YAN Hai-long,YAN Qiao,FENG Ji-qiang,et al.Research on standard system for mutual trust and mutual recognition based on PKI/CA in E-government[J].Journal of Shenzhen University Science and Engineering,2012,29(No.3(189-282)):113.[doi:10.3724/SP.J.1249.2012.02113]
[6]李雄伟,张鹏,陈开颜,等.微控制器密码芯片秩相关电磁分析[J].深圳大学学报理工版,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]
LI Xiong-wei,ZHANG Peng,CHEN Kai-yan,et al.Rank correlation electromagnetic analysis on microcontroller[J].Journal of Shenzhen University Science and Engineering,2012,29(No.3(189-282)):230.[doi:10.3724/SP.J.1249.2012.03230]
[7]张俊,刘德安,申自浩,等.面向轨迹数据发布的KSDP方案[J].深圳大学学报理工版,2023,40(2):236.[doi:10.3724/SP.J.1249.2023.02236]
ZHANG Jun,LIU Dean,SHEN Zihao,et al.KSDP scheme for trajectory data publishing[J].Journal of Shenzhen University Science and Engineering,2023,40(No.3(189-282)):236.[doi:10.3724/SP.J.1249.2023.02236]