Author:
Zhang Yi,Zhu Xiaodong,Qin Chuan,Yang Chunfang,Luo Xiangyang
Funder
National Nature Science Foundation of China
Excellent Youth Foundation of Henan Province of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Cheddad A, Condell J, Curran K et al (2010) Digital image steganography: Survey and analysis of current methods. Signal Process 90(3):727–752
2. Chen B, Wornell GW (2001) Quantization index Modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443
3. Denemark T, Fridrich J (2015) Side-informed steganography with additive distortion. In: Proceedings of International Workshop on Information Forensics and Security (WIFS), IEEE, pp 1–6
4. Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE - The International Society for Optical Engineering, 7880:0F-0F-14
5. Filler T, Judas J, Fridrich J (2010) Minimizing Embedding Impact in Steganography Using Trellis-coded Quantization. In: Proceedings of SPIE - The International Society for Optical Engineering, (7541): 175-178
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献