A NOVEL INFORMATION HIDING TECHNIQUE FOR SECURITY BY USING IMAGE STEGANOGRAPHY
暂无分享,去创建一个
[1] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[2] Cynthia E. Irvine,et al. Surmounting the Effects of Lossy Compression on Steganography , 1996 .
[3] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[4] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[5] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[6] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[7] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[8] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[9] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[10] Joshua Silman,et al. Steganography and Steganalysis: An Overview , 2001 .
[11] Tariq Jamil. Steganography: the art of hiding information in plain sight , 1999 .
[12] E Flahavin,et al. 19th National Information Systems Security Conference , 1997 .