Embedding in Two Least Significant Bits with Wet Paper Coding
暂无分享,去创建一个
[1] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[2] Xinpeng Zhang,et al. Integrated encoding with high efficiency for digital steganography , 2007 .
[3] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[4] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[5] Min Wu,et al. Improving Embedding Payload in Binary Imageswith "Super-Pixels" , 2007, 2007 IEEE International Conference on Image Processing.
[6] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[7] Jessica J. Fridrich,et al. Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.
[8] Jessica J. Fridrich,et al. Perturbed quantization steganography with wet paper codes , 2004, MM&Sec '04.
[9] Rainer Böhme,et al. Exploiting Preserved Statistics for Steganalysis , 2004, Information Hiding.
[10] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[11] Jessica J. Fridrich,et al. Efficient Wet Paper Codes , 2005, Information Hiding.
[12] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[13] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[14] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[15] Andrew D. Ker. Steganalysis of Embedding in Two Least-Significant Bits , 2007, IEEE Transactions on Information Forensics and Security.
[16] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[17] Jessica J. Fridrich,et al. Writing on wet paper , 2005, IEEE Transactions on Signal Processing.