High Quality Steganography Model with Attacks Detection
暂无分享,去创建一个
[1] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[2] Gustavus J. Simmons,et al. The history of subliminal channels , 1996, IEEE J. Sel. Areas Commun..
[3] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[4] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[5] Chang-Hsing Lee,et al. An adaptive digital image watermarking technique for copyright protection , 1999, IEEE Trans. Consumer Electron..
[6] Walter Bender,et al. Information Hiding to Foil the Casual Counterfeiter , 1998, Information Hiding.
[7] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[10] C. F. Osborne,et al. A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.
[11] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..