Author:
Chang Chin-Chen,Chen Tung-Shou,Chung Lou-Zo
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference10 articles.
1. On the limits of steganography;Anderson;IEEE Journal on Selected Areas in Communications,1998
2. A virtual image cryptosystem based upon vector quantization;Chen;IEEE Transactions on Image Processing,1998
3. E. Cole, Steganography, Information System Security Paper, George Mason University
4. Hidden digital watermarks in images;Hsu;IEEE Transactions on Image Processing,1999
5. Steganalysis: the investigation of hidden information;Johnson;IEEE Information Technology Conference,1998
Cited by
175 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A High Capacity Combined Carrier Steganography Without Embedding Image;2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech);2023-11-14
2. OPTP: A new steganography scheme with high capacity and security;Multimedia Tools and Applications;2023-07-24
3. Reversible Image Steganography to Achieve Effective PSNR;Lecture Notes in Electrical Engineering;2023
4. Developing an adaptive DCT-based steganography method using a genetic algorithm;Multimedia Tools and Applications;2022-11-17
5. Digital image steganography: A literature survey;Information Sciences;2022-09