Author:
Hong Wien,Chen Tung-Shou,Chang Yu-Ping,Shiu Chih-Wei
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software,Control and Systems Engineering
Reference15 articles.
1. F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn, Information hiding—a survey, in: Proceedings of IEEE, special issue on protection of multimedia content, 87(7), 1999, pp. 1062–1078.
2. Cyber warfare–steganography vs. steganalysis;Wang;Communications of the ACM,2004
3. LSB matching revisited;Mielikainen;IEEE Signal Processing Letters,2006
4. Efficient steganographic embedding by exploiting modification direction;Zhang;IEEE Communications Letters,2006
5. W. Hong, T.S. Chen, C.W. Shiu, A minimal Euclidean distance searching technique for sudoku steganography, in: Proceedings of International Symposium on Information Science and Engineering, vol. 1, 2008, pp. 515–518.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献