Author:
Ou Zhan-He,Chen Ling-Hwei
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference32 articles.
1. Data hiding for vector quantization images using mixed-base notation and dissimilar patterns without loss of fidelity;Chang;Inform. Sci.,2012
2. Steganalysis of reversible contrast mapping watermarking;Chen;IEEE Sig. Process. Lett.,2009
3. Digital Watermarking and Steganography;Cox,2008
4. Digital Watermarking and Steganography;Cox,2008
5. Chestega: chess steganography methodology;Desoky;Sec. Commun. Netw.,2009
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Gaming the system: tetromino-based covert channel and its impact on mobile security;International Journal of Information Security;2024-06-28
2. How fast can we play Tetris greedily with rectangular pieces?;Theoretical Computer Science;2024-04
3. Enigma on the Board: Chess-Based Steganography for Secure Communication;2024 International Conference on Green Energy, Computing and Sustainable Technology (GECOST);2024-01-17
4. Snake-Stega: A snake game-based steganography scheme;2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC);2023-05-26
5. A First Look at Private Communications in Video Games using Visual Features;Proceedings on Privacy Enhancing Technologies;2021-04-27