Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference25 articles.
1. Bender W, Gruhl D, Mormoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35:313–336
2. Byung JY, Jung KH, Yoo KY (2008) Improved data hiding method by exploiting modification direction. In: International symposium on ubiquitous multimedia computing, UMC ’08, pp 264–266
3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
4. Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci-Inf Comput Sci 141(1–2):123–138
5. Chang C-C, Kieu TD, Chou Y-C (2008) A high payload steganographic scheme based on (7, 4) Hamming code for digital images. In: International symposium on electronic commerce and security, Guangzhou, China, pp 16–21
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献