Steganography in Colored Images Using Information Reflector with 2^k Correction
暂无分享,去创建一个
[1] Gary C. Kessler,et al. An Overview of Steganography for the Computer Forensics Examiner , 2004 .
[2] Lahouari Ghouti,et al. Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking , 2007, SECRYPT.
[3] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[4] Kee-Young Yoo,et al. A New Image Steganography Based on 2k Correction and Edge-Detection , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[5] Ross Anderson,et al. Information hiding terminology , 1996 .
[6] Tricia Walker,et al. Computer science , 1996, English for academic purposes series.
[7] Adnan Abdul-Aziz Gutub,et al. A Novel Arabic Text Steganography Method Using Letter Points and Extensions , 2007 .
[8] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[9] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[10] Sushil Jajodia,et al. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.
[11] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[12] Kathryn Hempstalk,et al. Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .
[13] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[14] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[15] Naveed Sarfraz Khattak,et al. A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information , 2007 .