Author:
Sarmah Dipti Kapoor,Kulkarni Anand J.,Abraham Ajith
Publisher
Springer International Publishing
Reference27 articles.
1. Attaby, A.A., Ahmed, M.F.M.M., Alsammak, A.K.: Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng. J. 9(4), 1965–1974 (2018)
2. Avcıbas, I., Kharrazi, M., Memon, N., Sankur, B.: Image steganalysis with binary similarity measures. EURASIP J. Appl. Sig. Process. 17, 2749–2757 (2015)
3. Banerjee, S., Ghosh, B.R., Roy, P.: JPEG steganography and steganalysis—a review. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds.) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, Advances in Intelligent Systems and Computing, vol. 328, pp. 175–187. Springer, Cham (2015)
4. Chandramouli, R., Kharrazi, M., Memon, N.: Image steganography and steganalysis: concepts and practice. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) Digital Watermarking, IWDW 2003, Lecture Notes in Computer Science (LNCS), vol. 2939, pp. 35–49. Springer, Berlin (2004)
5. Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimedia. Tools Appl. 77(13), 17333–17373 (2018)