Author:
Zhao Wenqiang,Yang Bailong,Gong Shizhong,Zhang Linke
Reference21 articles.
1. Adjustment hiding method based on exploiting modification direction[J];Lee,2015
2. Reversible watermark using the difference expansion of a generalized integer transform[J];Alattar,2004
3. A steganographic scheme by fully exploiting modification directions
4. A Steganographic Scheme Based on Formula Fully Exploiting Modification Directions
5. Data encryption: A non-mathematical approach