Author:
Wang Shuo-zhong,Chen Chao,Zhang Xin-peng
Publisher
Springer Science and Business Media LLC
Subject
General Engineering,General Mathematics
Reference35 articles.
1. Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding[J]. IBM System Journal, 1996, 35(3, 4): 313–336.
2. Memon N, Wong P W. Protecting digital media content [J]. Communications of the ACM, 1998, 41(7): 34–43.
3. Johnson N F, Jajodia S. Exploring steganography: seeing the unseen[j]. IEEE Computer, 1998, 31(2): 26–34.
4. Provos N, Honeyman P. Hide and seek: an introduction to steganography [J]. IEEE Security and Privacy, 2003, 1(3): 32–44.
5. Wang S, Zhang X, Zhang K. Steganography and Steganalysis: Techniques of Cyber Warfare in the Internet Age[M]. Tsinghua University Press, Beijing, April 2005 (in Chinese).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献