A New Steganography Based on chi2 Technic
暂无分享,去创建一个
[1] Stefan Katzenbeisser,et al. Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.
[2] Qingzhong Liu,et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..
[3] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[4] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[5] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[6] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[7] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[8] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[9] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[10] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[11] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[12] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[13] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[14] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[15] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[16] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[17] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[18] Tao Zhang,et al. A fast and effective steganalytic technique against JSteg-like algorithms , 2003, SAC '03.
[19] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.