Author:
Ntaoulas Nikolaos,Drakopoulos Vasileios
Publisher
Springer International Publishing
Reference52 articles.
1. Ross J. Anderson and Fabien A.P. Petitcolas. On the limits of steganography. IEEE Journal on Selected Areas in Communications, 16(4):474–481, May 1998. https://doi.org/10.1109/49.668971
2. Paul Davern and Michael Scott. Fractal based image steganography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 1174, pages 279–294. Springer Verlag, 1996. https://doi.org/10.1007/3-540-61996-8_47
3. Chin Chen Chang, Chi Lung Chiang, and Ju Yuan Hsiao. A DCT-domain system for hiding fractal compressed images. In Proceedings - International Conference on Advanced Information Networking and Applications, AINA, volume 2, pages 83–86, 2005. https://doi.org/10.1109/AINA.2005.17
4. S Prasad, K Munivara and Jyothsna, V and Raju, SHK and Indraneel. High secure steganographic approach in BCBS for hiding compressed data and images in digital media. International Journal of Computer Science and Network Security, 10(4):162–170, 2010.
5. Hassanein Karim Hamza Tawfiq Abdulkhaleq Abbas. Steganography Using Fractal Images Technique. IOSR Journal of Engineering, 4(2):52–61, 2014. https://doi.org/10.9790/3021-04225261