Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference55 articles.
1. Abecidan, R., Itier, V., Boulanger, J., & Bas, P. (2021). Unsupervised JPEG domain adaptation for practical digital image forensics. In Proceedings of the IEEE international workshop on information forensics and security (pp. 1–6).
2. A steganography embedding method based on edge identification and XOR coding;Al-Dmour;Expert Systems with Applications,2016
3. A comparative study on content based image retrieval methods;Arora;International Journal of Latest Technology in Engineering, Management and Applied Science,2017
4. Bas, P., Filler, T., & Pevnỳ, T. (2011). Break our steganographic system: The ins and outs of organizing BOSS. In Proceedings of the international workshop on information hiding (pp. 59–70).
5. Cancelli, G., Doerr, G., Barni, M., & Cox, I. (2008). A comparative study of ±steganalyzers. In Proceedings of the IEEE 10th workshop on multimedia signal processing (pp. 791–796).