暂无分享,去创建一个
[1] Lisa M. Marvel,et al. A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[2] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[3] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[4] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[5] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[6] Subariah Ibrahim,et al. Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..
[7] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[10] Juan E. Tapiador,et al. Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..
[11] D. Artz,et al. Digital steganography: hiding data within data , 2001 .