Author:
Hemalatha J.,Devi M. K. Kavitha,Geetha S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference57 articles.
1. Pevny, T., Filler, T., Bas, P.: Using high-dimensional image models to perform highly undetectable steganography. In: Bohme, R., SafaviNaini, R. (eds.) 12th International Workshop on Information Hiding. Lecture Notes in Computer Science, Calgary, Canada, 28–30 June, pp. 161–177. Springer, New York (2010)
2. Holub, V., Fridrich, J.: Designing steganographic distortion using directional filters. In: IEEE Workshop on Information Forensic and Security, Tenerife, Canary Islands, 2–5 December, pp. 234–239 (2012)
3. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 1, 1–13 (2014).
http://jis.eurasipjournals.com/content/2014/1/1
4. Couchot, J.-F., Couturier, R., Guyeux, C.: STABYLO: steganography with adaptive, Bbs, and binary embedding at low cost. Ann. Telecommun. 70(9–10), 441–449 (2015).
https://doi.org/10.1007/s12243-015-0466-7
5. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Trans. Inf. Forensics Secur. 5(2), 201–214 (2010)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献