Author:
Bian Yuan,Tang Guangming,Gao Zhanzhan,Wang Shuo
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference20 articles.
1. Bas P, Filler T, Penvy T (2011) “Break our steganographic system”: the ins and outs of organizing BOSS[C]. information hiding. Springer, Berlin Heidelberg, pp 59–70
2. Denemark T, Fridrich J (2015) Improving steganographic security by synchronizing the selection channel[C]. Proc 3rd ACM Workshop Inform Hiding Multimed Sec. ACM: 5–14
3. Denemark T, Sedighi V, Holub V, et al. (2014) Selection-channel-aware rich model for steganalysis of digital images[C]. Inform Forensics Sec (WIFS), 2014 I.E. Int Workshop. IEEE: 48–53
4. Filler T, Fridrich J (2010) Minimizing additive distortion functions with non-binary embedding operation in steganography[C]. Inform Forensics Sec (WIFS), 2010 I.E. Int Work. IEEE: 1–6
5. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images[J]. Inform Forensics Sec, IEEE Trans 7(3):868–882
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献