Study on Airspace Covert Communication Algorithm of Covert Communication System
Abstract
Keywords
References
[1] L. L. WU.J. W. Zhang and Q. Ge, “Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm,” Control&Automation,2010, vol. 26, pp. 206–208.
[2] X. Y. Yan, “On Information Hiding System,” E-commerce,2010, vol. 26, pp. 312.
[3] Y. T. Han and Q. S. Wang, “Research on Binary Image Information Hiding Algorithm Based on Arnold,” Development and application of computer,2010, vol. 24, pp. 9–11.
[4] T. Liu and L. Q. Min, “The Cryptanalysis of animage Scrambling Algorithm Based on Arnold Transformation,” J. Wuhan Univ,2011, vol. 57, pp. 444–448.
[5] Q. L. Wang and F. M. Bai, “Blind Digital Watermarking Algorithm for Color Image Based on Arnold and DWT,” Journal of Jilin University,2011, vol. 29, pp. 304–310.
[6] L. S. Pan, “Arnold Transformation and Chaos Sequence Based on the Gray Image Hashing Algorithm,” Science Technology and Engineering,2011, vol. 11, pp. 4618–4622.
[7] L. Q. Guo,X. R. Zhang and Z. Li, “Rertoration Algorithm of Image Scrambling Based on Arnold Inverse Transformation,” Computer Applications and Software,2010, vol. 27, pp. 265–267.
[8] F. Liu O. Cao and B. X. Li, “Research of the DCT Arnold Shifts the Video Watermark,” Computer & Digital Engineering,2011, vol. 39, pp. 102–105.
[9] H. Q. Huang and S. X. Wu, “An Image Encryption Algorithm Based on 2D Discrete Chaotic Maps and Arnold,” Journal of Kashgar Teachers College,2010, vol. 31, pp. 17–19.
[10] D. M. Zhang and Z. K. Lei, “A digital watermarking algorithm based on Logistic mapping and arnold scrambling,” Electronic Design Engineering,2011, vol. 19, pp. 126–128.
[11] J. Yang and M. Jing, “Scheme of Information Hiding based on New Anti-Arnold Transformation and DCT Coefficient Blending,” Journal of Nanjing Institute of Technology,2010, vol. 8, pp. 38–44.
[12] C. Liu, “Covert communication of digital image on internet and the implementation of MATLAB,” Journal of Guizhou Normal College,2010, vol. 26, pp. 19–22.
[13] T. Zhang, “Two Pictures Hiding Arithmetic,” Western China Science and Technology,2009, vol. 8, pp. 26–27.
[14] C. M. Wu and X. P. Tian, “3-Dimensional Non-equilateral Arnold Transformation and its Application in Image Scrambling,” Journal of Computer-Aided Design & Computer Graphics,2010, vol. 22, pp. 1831–1840.
[15] Y. J. Ding,X. F. Zheng and G. R. Yu, “A Security Scheme Based on ARQ Technology for Image Hidden Communication,” Microcomputer Application,2009, vol. 30, pp. 8–13.
[16] Y. J. Ding,X. F. Zheng and G. R. Yu, “Security Model for Image Hidden Communication,” Computer Science,2010, vol. 37, pp. 120–130.
Full Text: PDF