Author:
Kamal A.H.M.,Islam Mohammad M.
Funder
ICT Division of the Ministry of Post, Telecommunication and Information Technology of the Government of Bangladesh
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Software
Reference43 articles.
1. Counter-forensics: attacking image forensics;Böhme;Digit Image Forensics,2013
2. Hiding fingerprint in face using scattered LSB embedding steganographic technique for smart card based authentication system;Brindha;Int J Comput Appl,2011
3. A novel image data hiding scheme with diamond encoding;Chao;EURASIP J Inform Sec,2009
4. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors;Chen;J Syst Softw,2013
5. Adaptive reversible image watermarking scheme;Chien-Chang;J Syst Softw,2011
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献