Funder
Innovative Research Group Project of the National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Reference37 articles.
1. Bender W, Gruhl D, Morimoto N et al (1996) Techniques for data hiding. IBM Syst J 35(3.4):313–336
2. Pevný T, Filler T, Bas P (2010) Using high-dimensional image models to perform highly undetectable steganography. Berlin, Heidelberg, International Workshop on Information Hiding. Springer, pp 161–177
3. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
4. Holub V, Fridrich J (2012) Designing steganographic distortion using directional filters. IEEE international workshop on information forensics and security (WIFS). IEEE, pp 234-239
5. Holub V, Fridrich J (2013) Digital image steganography using universal distortion. Proceedings of the first ACM workshop on information hiding and multimedia security, pp 59-68