Author:
Kuo Wen-Chung,Xiao Ren-Jun,Wang Chun-Cheng,Huang Yu-Chih
Publisher
Springer International Publishing
Reference10 articles.
1. Fridrich, J., Goljan, M., Du, R.: Detecting LSB steganography in color and grayscale images. IEEE Multimedia 8(4), 22–28 (2001)
2. Gu, S.S., Hao, T.: A pointer network based deep learning algorithm for 0–1 knapsack problem. In: 2018 Tenth International Conference on Advanced Computational Intelligence (ICACI), pp. 473–477 (2018)
3. Jung, K.H., Yoo, K.Y.: Improved exploiting modification direction method by modulus operation. Int. J. Signal Process. Image Process. Pattern 2(1), 79–88 (2009)
4. Kuo, W.C., Kuo, S.H., Chang, H.Y., Wuu, L.C.: Authenticated secret sharing scheme based on GMEMD. In: International Workshop on Digital-Forensics and Watermarking 2015, 07–10 October 2015
5. Kuo, W.C., Wang, C.C.: Data hiding based on generalized exploiting modification direction method. Imaging Sci. J. 61(6), 484–490 (2013)