A Secure Scheme for Image Transformation
暂无分享,去创建一个
Debnath Bhattacharyya | Samir Kumar Bandyopadhyay | Poulami Das | Debashis Ganguly | Swarnendu Mukherjee
[1] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[2] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[3] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[4] Manglem Singh,et al. Hiding Encrypted Message in the Features of Images , 2007 .
[5] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[6] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[7] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..