Author:
Kuo Wen-Chung,Chen Yi-Jiun,Wang Chun-Cheng,Huang Yu-Chih
Publisher
Springer International Publishing
Reference26 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge (AFIPS), vol. 48, pp. 313–317 (1979)
2. Chan, C.S., Liu, C.L., Tsai, Y.: Dual image reversible data hiding by modifying least significant-bit matching revisited rules. J. Electron. Sci. Technol. 15, 217–221 (2017)
3. Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recogn. 34, 469–474 (2004)
4. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and gray-scale images. IEEE Multimedia 8, 22–28 (2001)
5. Kieu, T.D., Chang, C.C.: A steganographic scheme by fully exploiting modification directions. Expert Syst. Appl. 38, 10648–10657 (2011)