Publisher
Springer Science and Business Media LLC
Reference53 articles.
1. Ballesteros DM, Renza D (2018) Secure speech content based on scrambling and adaptive hiding. Symmetry 10(12):694
2. Berk V, Giani A, Cybenko G, Hanover N (2005) Detection of covert channel encoding in network packet delays. Rapport technique TR536, de lUniversité de Dartmouth, pp 19
3. Bobade S, Goudar R (2015) Secure data communication using protocol steganography in ipv6. In: 2015 international conference on Computing communication control and automation (ICCUBEA). IEEE, pp 275–279
4. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography. Morgan Kaufmann
5. Cox IJ, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献