A New Purposed Issue for Secure Image Steganography Technique Based On 2-D Block DCT and DCT
暂无分享,去创建一个
[1] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[2] Tariq Jamil. Steganography: the art of hiding information in plain sight , 1999 .
[3] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[4] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[5] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[6] Joshua Silman,et al. Steganography and Steganalysis: An Overview , 2001 .
[7] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[8] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[9] D. Artz,et al. Digital steganography: hiding data within data , 2001 .