Affiliation:
1. Computer Engineering Dept., Hongik University
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference12 articles.
1. [1] B. Li, J. He, J. Huang, and Y.Q. Shi, “A survey on image steganography and steganalysis,” J. Information Hiding and Multimedia Signal Processing, vol.2, no.2, pp.142-172, April 2011.
2. [2] W. Mazurczyk and L. Caviglione, “Steganography in Modern Smartphones and Mitigation Techniques,” IEEE Communication Surveys & Tutorials, vol.17, no.1, pp.334-357, First Quarter 2015. 10.1109/comst.2014.2350994
3. [3] C.-H. Yang, C.-Y. Weng, S.-J. Wang, and H.-M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. on Information Forensics and Security, vol.3, no.3, pp.488-497, Sept. 2008. 10.1109/tifs.2008.926097
4. [4] J. Fridrich, D. Soukal, and M. Goljan, “Maximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain,” Proc. SPIE The Int. Society for Optical Engineering, vol.5681, pp.595-606, March 2005. 10.1117/12.584426
5. [5] W. Luo, F. Huang, and J. Huang, “Edge adaptive image steganography based on LSB matching revisited,” IEEE Trans. on Information Forensics and Security, vol.5, no.2, pp.201-214, June 2010. 10.1109/tifs.2010.2041812
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献