Author:
Arshad Ayesha,Siddiqui Nadia,Islam Saiful
Publisher
Springer Nature Singapore
Reference20 articles.
1. Wang, Z., Qian, Z., Zhang, X., Yang, M., Ye, D.: On improving distortion functions for JPEG steganography. IEEE Access 6, 74917–74930 (2018)
2. Sharifzadeh, M., Aloraini, M., Schonfeld, D.: Adaptive batch size image merging steganography and quantized Gaussian image steganography. IEEE Trans. Inf. Forensics Secur. 15, 867–879 (2019)
3. Newman, J., Lin, L., Chen, W., Reinders, S., Wang, Y., Wu, M., Guan, Y.: StegoAppDB: a steganography apps forensics image database. Electronic Imaging 2019(5), 536–541 (2019)
4. Chen, K., Zhang, W., Zhou, H., Yu, N., Feng, G.: Defining cost functions for adaptive steganography at the microscale. In: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 1–6. IEEE, (2016)
5. Holub, V., Fridrich, J., Denemark, T.: Universal distortion function for steganography in an arbitrary domain. EURASIP J. Inf. Secur. 2014(1), 1–13 (2014)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. RSTEG in TCP Protocol: A Novel Approach in Information Hiding;2024 2nd International Conference on Networking and Communications (ICNWC);2024-04-02