Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference29 articles.
1. Chapman M, Davida G (1997) Hiding the hidden: a software system for concealing ciphertext as innocuous text. Int Conf Inf Commun Secur 1334:335–345
2. Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the Chinese character encoding. J Internet Technol 18(2):91–98
3. Chen X, Sun H, Tobe Y, Zhou Z, Sun X (2015) Coverless information hiding method based on the Chinese mathematical expression. In: 1st international conference on cloud computing and security. Springer International Publishing, Nanjing, China, pp 133–143
4. Clemens B, Regenbogen C, Koch K et al (2015) Modeling and extending the ensemble classifier for steganalysis of digital images using hypothesis testing theory. IEEE Trans Inf Forensics Secur 10(12):2627–2642
5. Cogranne R, Retraint F (2013) An asymptotically uniformly most powerful test for LSB matching detection. IEEE Trans Inf Forensics Secur 8(3):464–476
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献