Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference45 articles.
1. Chandramouli R, Kharrazi M, Memon N, Steganography Image (2004) Steganalysis concepts and practice. In: Kalker T et al. (eds) IWDW 2003, LNCS 2939. Springer, Berlin, pp 35–49
2. Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit 36:1583–1595
3. Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur, (1), ID 658047
4. Chen W-J, Chang C-C, Le THN (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301
5. Chen M, Boroumand M, Fridrich J (2018) Deep learning regressors for quantitative steganalysis. Media Watermarking, Security, and Forensics, 160-1-160-7(7)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献