Steganographic Software: Analysis and Implementation
暂无分享,去创建一个
[1] Jiun-Jian Liaw,et al. An improvement of robust and blind data hiding based on self reference in spatial domain , 2007 .
[2] Johann A. Briffa,et al. Channel models for high-capacity information hiding in images , 2003, SPIE Optics + Photonics.
[3] Touradj Ebrahimi,et al. Perceptual quality assessment for video watermarking , 2002, Proceedings. International Conference on Information Technology: Coding and Computing.
[4] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[5] Klimis S. Ntalianis. A short-message robust steganographic method for effective information recovery under transmission losses of cellular networks , 2005 .
[6] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[7] Syed Fahad Tahir,et al. Support Vector Machine based Intelligent Watermark Decoding for Anticipated Attack , 2008 .
[8] Cuiling Jiang,et al. A steganographic method based on the JPEG digital images , 2011, 2011 3rd International Conference on Computer Research and Development.
[9] Prabir Bhattacharya,et al. A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[10] A. Viterbi. CDMA: Principles of Spread Spectrum Communication , 1995 .
[11] Jihane Bennour,et al. Watermarking attack: BOWS contest , 2007, Electronic Imaging.
[12] Gabriel Bugar,et al. A novel method of image steganography in DWT domain , 2011, Proceedings of 21st International Conference Radioelektronika 2011.
[13] Naman Agarwal,et al. Robust Watermarking in Transform Domain Using Edge Detection Technique , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[14] David G. Stork,et al. Pattern Classification , 1973 .
[15] Ioannis Pitas,et al. Protecting Digital-Image Copyrights: A Framework , 1999, IEEE Computer Graphics and Applications.
[16] Stephen Clark,et al. Linguistic Steganography Using Automatically Generated Paraphrases , 2010, NAACL.
[17] Jeffrey A. Bloom,et al. Computing the Probability of False Watermark Detection , 1999, Information Hiding.
[18] Arijit Sur,et al. Length based network steganography using UDP protocol , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[19] Bernd Girod,et al. Robustness of a blind image watermarking scheme , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[20] Malay Kumar Kundu,et al. Robust and Blind Spatial Watermarking In Digital Image , 2002, ICVGIP.
[21] A. N. Skodras. " Multiple Channel Watermarking of Color Images " , .