Author:
Kim Cheonshik,Shin Dongkyoo,Yang Ching-Nung,Chou Yung-Shun
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference21 articles.
1. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3-4):313–336
2. Bierbrauer J, Fridrich J (2008) Constructing good covering codes for applications in steganography. Transactions on Data Hiding and Multimedia Security III 4920:1–22
3. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
4. Crandall R (1998) Some notes on steganography.
http://dde.binghamton.edu/download/Crandall_matrix.pdf
. Accessed 31 May 2018
5. Fridrich J, Goljan M (2002) Practical steganalysis of digital images - state of the art. In: Proceedings SPIE photonics west, electronic imaging , security and watermarking of multimedia contents. San Jose, California, January 1–13, vol 4675
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献