Author:
Liu Jiufen,Tian Yuguo,Han Tao,Wang Junchao,Luo Xiangyang
Publisher
Springer Science and Business Media LLC
Reference17 articles.
1. Zhang W M, Li S Q. Information-theoretic analysis for the difficulty of extracting hidden information. Wuhan Univm J Nat Sci, 2005, 10: 315–318
2. Regalia P A. Cryptographic secrecy of steganographic matrix embedding. IEEE Trans Inf Forens Secur, 2008, 3: 786–791
3. Liu J F, Chen J Y, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. In: Proceedings of the IEEE International Conference on Multimedia Information Networking and Security, Nanjing, 2010. 691–695
4. Chen J Y, Liu J F, Zhang W M, et al. Cryptographic secrecy analysis of matrix embedding. Int J Comput Intell Syst, 2013, 6: 639–647
5. Fridrich J, Goljan M, Soukal D. Searching for the stego-key. In: Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, 2004. 70–82
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deep learning based active image steganalysis: a review;International Journal of System Assurance Engineering and Management;2023-11-27
2. Extraction Method of Secret Message Based on Optimal Hypothesis Test;IEEE Transactions on Dependable and Secure Computing;2023-11
3. Steganlysis on data embedded medical image;Journal of Discrete Mathematical Sciences & Cryptography;2023
4. Novel Hidden Bit Location Method towards JPEG Steganography;Security and Communication Networks;2022-05-19
5. Toward Steganographic Payload Location via Neighboring Weight Algorithm;Security and Communication Networks;2022-02-25