Author:
Paul Goutam,Davidson Ian,Mukherjee Imon,Ravi S. S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference33 articles.
1. Bas P, Filler T, Pevny T (2011) Break our steganographic system, the ins and outs of organizing BOSS. Lecture notes in computer science, vol 6958/2011. Information Hiding, Czech Republic, pp 59–70
2. Cheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. Signal Process 90(3):727–752
3. Cipra B (1987) An introduction to the Ising model. Am Math Mon 94(10):937–959
4. Coremen T, Leiserson C, Rivest R, Stein C (2001) Introduction to algorithm, 2nd edn. McGraw Hill
5. Das SK, Dhara BC (2015) A new secret image sharing with arithmetic coding. In: Proceedings of 2015 IEEE international conference on research in computational intelligence and networks, Kolkata, pp 395–399
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献