Author:
Tasevski Ivo,Nikolovska Viktorija,Petrova Anastasija,Dobreva Jovana,Popovska-Mitrovikj Aleksandra,Dimitrova Vesna
Publisher
Springer International Publishing
Reference15 articles.
1. Bandyopadhyay, S.K., Bhattacharyya, D., Ganguly, D., Mukherjee, S., Das, P.: A tutorial review on steganography. University of Calcutta, Senate House, Computer Science and Engineering Department, Heritage Institute of Technology, Anandapur, Kolkata
2. Al-Azzeh, J., Alqadi, Z., Ayyoub, B., Sharadqh, A.: Improving the security of LSB image steganography. Computer Engineering Department, Al Balqa’a Applied University, Amman, Jordan, vol. 3(4) (2019)
3. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia 8(4), 22–28 (2001). https://doi.org/10.1109/93.959097
4. Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. http://www.jjtc.com/ihws98/jjgmu.html
5. Jung, K.-H.: A study on machine learning for steganalysis. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing (ICMLSC 2019), pp. 12–15. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3310986.3311000
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. StegIm: Image in Image Steganography;Communications in Computer and Information Science;2022