Author:
Wu Mei-Yi,Ho Yu-Kun,Lee Jia-Hong
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Fridrich, J.: Applications of Data Hiding in Digital Images. In: Tutorial for The ISSPA 1999, Brisbane, Australia (August 1999)
2. Chen, T.S., Chang, C.-C., Hwang, M.-S.: A Virtual Image Cryptosystem Based upon Vector Quantization. IEEE Trans. Image Processing 7(10), 1485–1488 (1998)
3. Sandford, M.T., Bradley, J.N., Handel, T.G.: The Data Embedding Method. In: SPIE Photonics East Conference (1995)
4. Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for Data Hiding. IBM System Journal 35(3&4), 313–336 (1996)
5. Hsu, C.-T., Wu, J.-L.: Hidden Signatures in Images. In: Proceedings of ICIP, pp. 223–226 (1996)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Study and Comparative Analysis of Data Hiding Methods for Animated GIFs;2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC);2023-05-26
2. A Review on GIF-Based Steganography Techniques;Lecture Notes in Electrical Engineering;2023