A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images
暂无分享,去创建一个
K.B. Raja | K.R. Venugopal | L.M. Patnaik | C.R. Chowdary | K. Venugopal | L. Patnaik | K. Raja | C. R. Chowdary
[1] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[2] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[3] Nicholas Hopper,et al. Public-Key Steganography , 2003, EUROCRYPT.
[4] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[5] Lisa M. Marvel,et al. Reliable Blind Information Hiding for Images , 1998, Information Hiding.
[6] O. F. Cook. The Method of Types , 1898 .
[7] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[8] Miroslav Goljan,et al. Steganalysis based on JPEG compatibility , 2001, SPIE ITCom.
[9] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[10] Tuomas Aura,et al. Practical Invisibility in Digital Communication , 1996, Information Hiding.
[11] Imre Csisźar,et al. The Method of Types , 1998, IEEE Trans. Inf. Theory.
[12] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..