Location-Based Image Steganography
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. A reversible data hiding scheme using complementary embedding strategy , 2010, Inf. Sci..
[2] Fenlin Liu,et al. Secure Steganography in Compressed Video Bitstreams , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[3] Der-Chyuan Lou,et al. A steganographic scheme for secure communications based on the chaos and euler Theorem , 2004, IEEE Transactions on Multimedia.
[4] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[5] Chin-Chen Chang,et al. A Reversible Data Hiding Scheme Based on Side Match Vector Quantization , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Der-Chyuan Lou,et al. Steganographic Method for Secure Communications , 2002, Comput. Secur..
[7] Der-Chyuan Lou,et al. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..
[8] André R. S. Marçal,et al. A Steganographic Method for Digital Images Robust to RS Steganalysis , 2005, ICIAR.
[9] K. Jemili,et al. Data hiding within audio signals , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).
[10] Yôiti Suzuki,et al. Time-spread echo method for digital audio watermarking , 2005, IEEE Transactions on Multimedia.
[11] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[12] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[13] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[14] Der-Chyuan Lou,et al. Novel steganalysis schemes for BPCS steganography , 2008 .
[15] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[16] A.A. Hanafy,et al. A secure covert communication model based on video steganography , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[17] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[18] Jia Wu,et al. Optimal Objects of Cooperation Selection for Human Activity in Opportunistic Networks , 2014, Smart Comput. Rev..