High-capacity method for hiding data in the discrete cosine transform domain
暂无分享,去创建一个
[1] Jean-Luc Dugelay,et al. A Data Mapping Method for Steganography and Its Application to Images , 2008, Information Hiding.
[2] Amir Hossein Farzaneh,et al. Eigenvalue Steganography based on eigen characteristics of quantized DCT matrices , 2011, ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia.
[3] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[4] Hung-Min Sun,et al. A LSB substitution compatible steganography , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[5] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[6] Jiangqun Ni,et al. An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients , 2012, Int. J. Digit. Crime Forensics.
[7] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[8] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..
[9] Yun Q. Shi,et al. An efficient JPEG steganographic scheme using uniform embedding , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[10] Jessica J. Fridrich,et al. New methodology for breaking steganographic techniques for JPEGs , 2003, IS&T/SPIE Electronic Imaging.
[11] Reza Safabakhsh,et al. Adaptive method for hiding data in images , 2012, J. Electronic Imaging.
[12] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[13] Shahrokh Ghaemmaghami,et al. LSB++: An improvement to LSB+ steganography , 2011, TENCON 2011 - 2011 IEEE Region 10 Conference.
[14] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[15] D. Levicky,et al. A novel JPEG steganography method secure against histogram steganalysis , 2012, Proceedings ELMAR-2012.
[16] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[17] Andreas Pfitzmann,et al. Attacks on Steganographic Systems Breaking the Steganographic Utilities EzStego , Jsteg , Steganos , and STools — and Some Lessons Learned , 2000 .
[18] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).