Steganalysis: the investigation of hidden information
暂无分享,去创建一个
[1] Ahmed H. Tewfik,et al. Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[2] Jerry White,et al. for published , 1999 .
[3] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[4] Sushil Jajodia,et al. A Role for Digital Watermarking in Electronic Commerce , 1999 .
[5] Ingemar J. Cox,et al. A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.
[6] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[7] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[8] Walter Bender,et al. Echo Hiding , 1996, Information Hiding.
[9] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[10] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[11] Ingo Stierand,et al. Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.
[12] P. Strevens. Iii , 1985 .
[13] Markus G. Kuhn,et al. Attacks on Copyright Marking Systems , 1998, Information Hiding.
[14] Lisa M. Marvel,et al. Reliable Blind Information Hiding for Images , 1998, Information Hiding.
[15] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[16] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[17] Karsten P. Ulland,et al. Vii. References , 2022 .
[18] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.