暂无分享,去创建一个
[1] Sorina Dumitrescu,et al. Detection of LSB Steganography via Sample Pair Analysis , 2002, Information Hiding.
[2] Sanjay Kumar Jena,et al. A Novel Visual Cryptography Scheme , 2009, 2009 International Conference on Advanced Computer Control.
[3] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[4] Tai-Wen Yue,et al. A neural network approach for visual cryptography , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.
[5] Kian-Lee Tan,et al. Steganographic schemes for file system and B-tree , 2004, IEEE Transactions on Knowledge and Data Engineering.
[6] Ning Liu,et al. Statistically Secure Digital Image Data Hiding , 2005, 2005 IEEE 7th Workshop on Multimedia Signal Processing.
[7] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[8] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[9] Vincent Rijmen,et al. The NIST Cryptographic Workshop on Hash Functions , 2006, IEEE Secur. Priv..
[10] V. Sridhar,et al. Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[11] Salvatore Gravano,et al. Introduction to Error Control Codes , 2001 .
[12] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).