暂无分享,去创建一个
[1] Nabin Ghoshal,et al. Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM) , 2009, 2009 IEEE International Advance Computing Conference.
[2] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[3] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[4] A.I. Hashad,et al. A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.
[5] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[6] J. K. Mandal,et al. A Novel Technique for Image Authentication in Frequency Domain Using Discrete Fourier Transformation Technique (IAFDDFTT) , 2008 .
[7] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[8] J.K. Mandal,et al. Masking based Data Hiding and Image Authentication Technique (MDHIAT) , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[9] Yao Zhao,et al. Improved Adaptive LSB Steganography Based on Chaos and Genetic Algorithm , 2010, EURASIP J. Adv. Signal Process..
[10] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[11] Vincent Rijmen,et al. The NIST Cryptographic Workshop on Hash Functions , 2006, IEEE Secur. Priv..
[12] V. Sridhar,et al. Multivariate entropy detector based hybrid image registration , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[13] Sorina Dumitrescu,et al. Detection of LSB steganography via sample pair analysis , 2002, IEEE Trans. Signal Process..