Author:
Fan Li,Gao Tiegang,Yang Qunting,Cao Yanjun
Subject
Electrical and Electronic Engineering,General Computer Science,Control and Systems Engineering
Reference20 articles.
1. Simmons GJ. The prisoners’ problem and the subliminal channel. In: Advances in cryptology: proceedings of crypto 83, New York; 1984. p. 51–67.
2. van Schyndel RG, Tirkel A, Osborne CF. A digital watermark. In: Proc. of int. conf. on image processing, Austin; November 1994. p. 86–9.
3. Franz E, Jerichow A, Moller S, Pfitzmann A, Stierand I. Computer based steganography: how it works and why therefore any restrictions on cryptography are nonsense, at best. In: Proc. of the 1st international workshop on information hiding, Cambridge; May 1996. p. 7–21.
4. Zhang Tao, Ping Xijian. A fast and effective steganalytic technique against JSteg-like algorithms. In: Proc. 8th ACM symp. on applied computing, Florida; March 2003. p. 307–11.
5. Attacks on steganographic systems;Westfeld;Lect Notes Comput Sci,2000
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献