Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference33 articles.
1. Al-Bahadili H (2008) A novel lossless data compression scheme based on the error correcting Hamming codes. Comput Math Appl 56(1):143–150
2. Bailey K, Curran K (2006) An evaluation of image based steganography methods using visual inspection and automated detection techniques. Multimed Tool Appl 30(1):55–58
3. Chang C, Kieu TD (2010) A reversible data hiding scheme using complementary embedding strategy. Inf Sci 180(16):3045–3058
4. Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing cipher text as innocuous text. In: The proceedings of the international conference on information and communications security. Lecture notes in computer science, vol 1334. Springer, Beijing, pp 335–345
5. Chapman M, Davida GI (2001) A practical and effective approach to largescale automated linguistic steganography. In: Proceedings of the Information Security Conference (ISC’01), lecture notes in computer science, vol 2200. Springer, Malaga, pp 156–165
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementation and Performance Evaluation of Asymmetrical Encryption Scheme for Lossless Compressed Grayscale Images;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2024
2. Minimizing Distortion in Steganography via Adaptive Language Model Tuning;Communications in Computer and Information Science;2023-11-26
3. A Streamlined GAN Based Real-Time Image Information Hiding for Networked Visual Servo Systems;2023 42nd Chinese Control Conference (CCC);2023-07-24
4. A novel font color and compression text steganography technique;2023 International Conference on Communication, Computing and Digital Systems (C-CODE);2023-05-17
5. IoTree;Proceedings of the 28th Annual International Conference on Mobile Computing And Networking;2022-10-14