Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference27 articles.
1. Cachin, C. (2004). An information-theoretic model for steganography. Information and Computation Elsevier, 192(1), 41–56.
2. Pevny, T., Bas, P., & Fridrich, J. (2010). Steganalysis by subtractive pixel adjacency matrix. IEEE Transactions on Information Forensics and Security, 5(2), 215–224.
3. Pevny, T., Filler, T., & Bas, P. (2010). Using high-dimensional image models to perform Highly undetectable steganography. International Workshop on Information Hiding, 6387, 161–177.
4. Holub, V., Fridrich, J., & Denemark, T. (2014). Universal distortion function for steganography in an arbitrary domain. EURASIP Journal on Information Security.
http://jis.eurasipjournals.com/content/2014/1/1
. Accessed December 25, 2016.
5. Holub, V., & Fridrich, J. (2012). Designing steganographic distortion using directional filters. In Fourth IEEE international workshop on information forensics and security (pp. 234–239).
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献