Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned
暂无分享,去创建一个
[1] Andreas Westfeld,et al. Steganography in a Video Conferencing System , 1998, Information Hiding.
[2] R. Plackett,et al. Introduction to Statistical Analysis. , 1952 .
[3] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[4] Abraham Lempel,et al. A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.
[5] Terry A. Welch,et al. A Technique for High-Performance Data Compression , 1984, Computer.