Constructive Role of SFC & RGB Fusion versus Destructive Intrusion
暂无分享,去创建一个
[1] Andreas Westfeld. Space filling curves in steganalysis , 2005, IS&T/SPIE Electronic Imaging.
[2] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[3] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[4] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[5] Min-Shiang Hwang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..
[6] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[7] Ki-Ryong Kwon,et al. An Image Steganography Using Pixel Characteristics , 2005, CIS.
[8] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[9] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[10] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[11] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[12] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[13] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[14] Marco Furini,et al. International Journal of Computer and Applications , 2010 .
[15] H. Sagan. Space-filling curves , 1994 .
[16] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[17] Tuomas Aura,et al. Practical Invisibility in Digital Communication , 1996, Information Hiding.
[18] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[19] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[20] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[21] Chin-Chen Chang,et al. Lossless data hiding for color images based on block truncation coding , 2008, Pattern Recognit..
[22] Chin-Chen Chang,et al. A new steganographic method for color and grayscale image hiding , 2007, Comput. Vis. Image Underst..
[23] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .