Author:
Li Songbin,Wang Jingang,Yan Qiandong,Liu Peng,Wei Miao
Publisher
Springer International Publishing
Reference30 articles.
1. Satir, E., Isik, H.: A Huffman compression based text steganography method. Multimed. Tools Appl. 70(3), 2085–2110 (2014)
2. Chang, C.-Y., Clark, S.: Practical linguistic steganography using contextual synonym substitution and vertex colour coding. In: Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, ser. EMNLP 2010, pp. 1194–1203. Association for Computational Linguistics, USA (2010)
3. Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Proceedings of the 12th International Conference on Information Hiding, ser. IH-10, pp. 161–177. Berlin (2010)
4. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014). https://doi.org/10.1186/1687-417X-2014-1
5. Djebbar, F., Ayad, B., Meraim, K.A., Hamam, H.: Comparative study of digital audio steganography techniques. EURASIP J. Audio Speech Music Process. 2012, 1–16 (2012)