Author:
Biswas Rajib,Bandyapadhay Samir Kumar
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference48 articles.
1. Cachin C An Information-Theoretic Model for Steganography, presented at the 2nd Workshop on Information Hiding. In: Aucsmith, D (ed) Lecture Notes in Computer Science, vol 1525. Springer
2. Chang C-C, Hsiao J-Y, Chan C-S (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognit 36:1583–1595
3. Chanu YJ, Singh M, Tuithung T (2012) Image steganography and steganalysis - a survey. Int J Comput Appl 52(2):1–11
4. Chao R-M, Wu H-C, Lee C-C, Chu Y-P (2009) A novel image data hiding scheme with diamond encoding. EURASIP J Inf Secur 2009(1):658047
5. Chen W-J, Chang C-C, Le Thn (2010) High payload steganography mechanism using hybrid edge detector. Expert Syst Appl 37:3292–3301
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献