Author:
Qiao Tong,Wang Shuai,Luo Xiangyang,Zhu Zhiqiang
Funder
National Natural Science Foundation of China
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software,Control and Systems Engineering
Reference32 articles.
1. Gibbs construction in steganography;Filler;IEEE Trans. Inf. Forensics Secur.,2010
2. Universal distortion function for steganography in an arbitrary domain;Holub;EURASIP Journal on Information Security,2014
3. Uniform embedding for efficient jpeg steganography;Guo;IEEE Trans. Inf. Forensics Secur.,2014
4. A new cost function for spatial image steganography;Li,2014
5. Using statistical image model for jpeg steganography: uniform embedding revisited;Guo;IEEE Trans. Inf. Forensics Secur.,2015
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献