Funder
Iran National Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference34 articles.
1. Avcibas I, Memon N, Sankur B (2002) Image steganalysis with binary similarity measures, the mage Processing. Proceedings, International Conference on, pp 645–648
2. Avcibas I, Memon N, Sankur B (2003) Steganalysis using image quality metrics. IEEE Trans Image Process 12(2):221–229
3. Farid H (2002) Detecting hidden messages using higher-order statistical models. In: International Conference on Image Processing, vol. 2. pp II–905
4. Fazio N, Nicolosi AR, Perera IM (2014) Broadcast steganography. In: Topics in Cryptology–CT-RSA, Springer, pp 64–84
5. Filler T, Fridrich J (2010) Gibbs construction in steganography. IEEE Trans Inf Forensics Secur 5(4):705–720
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献