Author:
Sajedi Hedieh,Jamzad Mansour
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference36 articles.
1. Raja, K.B., Chowdary, C.R., Venugopal, K.R., Patnaik, L.M.: A secure image steganography using LSB, DCT and compression techniques on raw images. In: Proceeding of 3rd International Conference of Intelligent Sensing and Information, pp. 170–176 (2005)
2. Martin, A., Sapiro, G., Seroussi, G.: Is image steganography natural? Technical Report. Information Theory Research Group, HP Laboratories Palo Alto (2004)
3. Westfeld, A.: F5-a steganographic algorithm: high capacity despite better steganalysis. In: Proceedings of 4th International Workshop on Information Hiding (2001)
4. Sallee, P.: Model-based steganography. In: Proceedings of International Workshop on Digital Watermarking, Korea (2003)
5. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: Proceedings of ACM Multimedia Workshop, Germany (2004)
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献