Steganography and Steganalysis through XMP
暂无分享,去创建一个
[2] Asha Pathak,et al. Image Steganography and Steganalysis : A Survey , 2014 .
[3] Dr. A. N. Cheeran,et al. Performance Evaluation of Steganography and AES encryption based on different formats of the Image , 2015 .
[4] Jiwu Huang,et al. Secure JPEG steganography by LSB+ matching and multi-band embedding , 2011, 2011 18th IEEE International Conference on Image Processing.
[5] Huayong Ge,et al. Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.
[6] N. C. Debnath,et al. Evaluating image steganography techniques: Future research challenges , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).
[7] Navneet Kaur,et al. A Survey on various types of Steganography and Analysis of Hiding Techniques , 2014 .
[8] Seyyed Amin Seyyedi,et al. Digital Image Steganography Concept and Evaluation , 2013 .
[9] Abikoye OluwakemiC.,et al. Efficient Data Hiding System using Cryptography and Steganography , 2012 .
[10] Kazeem Alagbe Gbolagade,et al. A Residue Number System Based Data Hiding Using Steganography and Cryptography , 2019 .
[11] G. Prashanti,et al. Data confidentiality using steganography and cryptographic techniques , 2017, 2017 International Conference on Circuit ,Power and Computing Technologies (ICCPCT).
[12] Minati Mishra,et al. Steganography - A Game of Hide and Seek in Information Communication , 2016, ArXiv.