Author:
Kim Cheonshik,Yang Ching-Nung
Publisher
Springer International Publishing
Reference18 articles.
1. Bender, W., Gruhl, D., Mormoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35, 313–336 (1996)
2. Provos, N., Honeyman, P.: Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32–44 (2003)
3. Zhang, W., Wang, S., Zhang, X.: Improve embedding efficiency of covering codes for applications in steganography. IEEE Commun. Lett. 11(8), 680–682 (2007)
4. Chang, C.-C., Kieu, T.D., Chou, Y.-C.: A high payload steganographic scheme based on (7, 4) Hamming code for digital images. In: International Symposium on Electronic Commerce and Security, Guangzhou, China, pp. 16–21 (2002)
5. Lecture Notes in Computer Science;A Westfeld,2001
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献