Image Security Using Steganography And
暂无分享,去创建一个
[1] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[2] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[3] S.B. Sadkhan. Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..
[4] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[5] Arvind Kumar,et al. Steganography- A Data Hiding Technique , 2010 .
[6] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[7] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[8] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[9] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[10] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[11] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.