Publisher
SPIE-Intl Soc Optical Eng
Subject
General Engineering,Atomic and Molecular Physics, and Optics
Reference34 articles.
1. Exploring steganography: Seeing the unseen
2. N. Provos and P. Honeyman , “Hide and seek: an introduction to steganography,” IEEE Security Privacy Mag.1, 32–44 (2003).
3. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker ,Digital Watermarking and Steganography, pp. 429–495, Morgan Kaufmann Pub., Burlington (2008).
4. A. Westfeld and A. Pfitzmann , “Attacks on steganographic systems,” inProc. 3rd Int. Workshop in Information Hiding, pp. 61–76, Springer-Verlag, Berlin (1999).
5. J. Fridrich, M. Goljan, and D. Hogea , “Steganalysis of jpeg images: breaking the F5 algorithm,” inProc. 5th Int. Workshop in Information Hiding, pp. 310–323, Springer-Verlag, Berlin (2002).
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Gaming the system: tetromino-based covert channel and its impact on mobile security;International Journal of Information Security;2024-06-28
2. Snake-Stega: A snake game-based steganography scheme;2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC);2023-05-26
3. Secure high capacity tetris‐based scheme for data hiding;IET Image Processing;2020-12
4. A minesweeper game-based steganography scheme;Journal of Information Security and Applications;2017-02
5. A steganographic method based on tetris games;Information Sciences;2014-08