Author:
Kaur Mohanjeet,Juneja Mamta
Reference17 articles.
1. Artz, D.: ‘Digital steganographic: hiding data within data’, IEEE Int. Comput., 2001, 5, (3), pp. 75–80.
2. Lee, Y.K., Chen, L.H.: ‘High capacity image steganography model’, Proc. of IEEE on Vision, Image and Signal Process., vol. 147, no. 3, pp. 288–294, 2000.
3. Benlcouiri, Y., Ismaili, M., Azizi, A., and Benabdellah, M., “Securing images by secret key steganography,” Applied Mathematical Sciences, vol. 6, no. 111, pp. 5513–5523, 2012.
4. Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin (2000), “Hiding Data in Images by Optimal Moderately Significant Bit Replacement” IET Electronics Letters, vol. 36, no. 25, pp. 2069–2070.
5. J. Canny, “A Computational Approach to Edge Detection,” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 8, pp. 679–687, 1986.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献