暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.
[2] C. A. Dhote,et al. A Survey Of Digital Watermarking Techniques , 2015 .
[3] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[4] M. C. Adhikary,et al. Image Encryption Using Fibonacci-Lucas Transformation , 2012, ArXiv.
[5] H.M. Wechsler,et al. Digital image processing, 2nd ed. , 1981, Proceedings of the IEEE.
[6] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[7] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[8] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[9] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[10] Minati Mishra,et al. Security Enhanced Digital Image Steganography Based on Successive Arnold Transformation , 2012 .
[11] Walter Bender,et al. Techniques for data hiding , 1995, Electronic Imaging.
[12] H C Yin,et al. A Survey of Digital Watermarking , 2005 .
[13] Bin Zhu,et al. Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[14] Mohammad Hassan Shirali-Shahreza,et al. A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.