Publisher
Springer Berlin Heidelberg
Reference24 articles.
1. Lect Notes Comput Sci,1996
2. R. J. Anderson and F. A. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, vol. 16, May 1998.
3. T. C. Bell, J. G. Cleary, and I. H. Witten, Text Compression. Prentice Hall, 1990.
4. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3 & 4, 1996.
5. J. O. Berger, Statistical Decision Theory and Bayesian Analysis. Springer, 2. ed., 1985.
Cited by
190 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Novel Steganalysis Method for Stego-Images Directly Constructed from Color Images Based on Their Quantum Noise;Journal of Shanghai Jiaotong University (Science);2024-09-13
2. Cover-source mismatch in steganalysis: systematic review;EURASIP Journal on Information Security;2024-08-12
3. Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media;Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security;2024-06-24
4. Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
5. Enhancing Steganography of Generative Image Based on Image Retouching;ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2024-04-14