Author:
Wu Songtao,Liu Yan,Zhong Shenghua,Liu Yang
Reference39 articles.
1. P. Bas, T. Filler, and T. Pevny. Boss (break our steganography system). http://boss.gipsa-lab.grenoble-inp.fr, 2009.
2. W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding.IBM System Journal, 35(3):313--336, 1996.
3. C. Cachin. An information theoretic model for steganography.Information and Computation, 192(1):41--56, 2004.
4. S. Dumitrescu, X. Wu, and Z. Wang. Detection of lsb steganography via sample pair analysis.IEEE Transactions on Signal Processing, 51(7):1995--2007, 2003.
5. T. Filler and J. Fridrich. Complete characterization of perfectly secure stegosystems with mutually independent embedding operation. InICASSP, pages 1429--1432, 2009.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献