Author:
Lin Jiang-Yi,Chen Yu,Chang Chin-Chen,Hu Yu-Chen
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference29 articles.
1. Alanizy N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci 3(4):118–124
2. Bai J, Chang CC, Nguyen TS, Zhu C, Liu YJ (2017) A high payload steganographic algorithm based on edge detection. Displays. 46:42–51
3. Chang CC, Yu YH, Hu YC (2005) Hiding secret data in images via predictive coding. Pattern Recogn 38(5):691–705
4. Chang CC, Wu WC, Hu YC (2007) Lossless recovery of a VQ index table with embedded secret data. J Vis Commun Image Represent 18(3):207–216
5. Chang CC, Kieu TD, Chou YC (2007) Reversible data hiding scheme using two steganographic images. In: Proceedings of IEEE Region 10 International Conference (TENCON), Taipei, Taiwan, pp 1–4
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献