Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference61 articles.
1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Doctoral thesis, Univ. Buckingham, UK
2. Bansal S (2020) Performance comparison of five metaheuristic nature-inspired algorithms to find near-OGRs for WDM systems. Artif Intell Rev. https://doi.org/10.1007/s10462-020-09829-2
3. Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: Filler T et al (eds) Information hiding. LNCS 6958, pp 59–70. https://doi.org/10.1007/978-3-642-24178-9_5
4. Boroumand M, Chen M, Fridrich J (2019) Deep residual network for steganalysis of digital images. IEEE Trans Inf Forensic Secur 14(5):1181–1193. https://doi.org/10.1109/TIFS.2018.2871749
5. Burke EK, Gendreau M, Hyde M, Kendall G, Ochoa G, Özcan E, Qu R (2013) Hyper-heuristics: a survey of the state of the art. J Oper Res Soc 64:1695–1724. https://doi.org/10.1057/jors.2013.71
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献