A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher
暂无分享,去创建一个
[1] Product perfect codes and steganography , 2009, Digit. Signal Process..
[2] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[3] Homayun Motameni,et al. Labeling Method in Steganography , 2007 .
[4] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[5] Guillermo Sapiro,et al. Is image steganography natural? , 2005, IEEE Transactions on Image Processing.
[6] Mohammed Abbas Fadhil Al-Husainy. Image Steganography by Mapping Pixels to Letters , 2009 .
[7] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Ran-Zan Wang,et al. High-payload image steganography using two-way block matching , 2006, IEEE Signal Processing Letters.
[10] Aman Jantan,et al. A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion , 2008 .
[11] Chung-Ming Wang,et al. Steganography on point-sampled geometry , 2006, Comput. Graph..
[12] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[13] Xinpeng Zhang,et al. Multibit Assignment Steganography in Palette Images , 2008, IEEE Signal Processing Letters.
[14] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .