Author:
Wang Kan,Lu Zhe-Ming,Hu Yong-Jian
Subject
Hardware and Architecture,Information Systems,Software
Reference15 articles.
1. JPEG steganography: a performance evaluation of quantization tables;Almohammad,2009
2. A steganographic method based upon JPEG and quantization table modification;Chang;Information Sciences,2002
3. Reversible hiding in DCT-based compressed images;Chang;Information Sciences,2007
4. A reversible JPEG-to-JPEG data hiding technique;Cheng,2009
5. Invertible authentication watermark for JPEG images;Fridrich,2001
Cited by
116 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献