Author:
Li Fengyong,Wen Mi,Lei Jingsheng,Ren Yanli
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference33 articles.
1. JSTeg algorithm. Available from:
http://zooid.org/%7epaul/crypto/jsteg/
[Accessed on 2011]
2. Westfeld A (2001) High capacity despite better steganalysis (f5-a steganographic algorithm). In: Proceedings of 4th international workshop on information hiding. Pittsburgh, PA, April 25–27, pp 289–302
3. Fridrich J, Pevný T, Kodovský J (2007) Statistically undetectable JPEG steganography: dead ends, challenges, and opportunities. In: Proceedings of the 9th ACM multimedia & security workshop, Dallas, TX, September 20–21, pp 3–14
4. Qin C, Chang C, Huang Y, Liao L (2013) An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Trans Circuits Syst Video Technol 23(7):1109–1118
5. Filler T, Fridrich J (2011) Design of adaptive steganographic schemes for digital images. In: Proceedings of SPIE, electronic imaging, media watermarking, security, and forensics XIII, San Francisco, CA, January 23–26
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献