A stegnography implementation
暂无分享,去创建一个
[1] H. V. Jagadish,et al. Information warfare and security , 1998, SGMD.
[2] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[3] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[4] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[5] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[6] Ajay Jadhav,et al. Steganography An Art of Hiding Data , 2009, ArXiv.
[7] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[8] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[9] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.