Semi Random Position Based Steganography for Resisting Statistical Steganalysis
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[2] Der-Chyuan Lou,et al. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] P. Shah,et al. Adaptive Wavelet Packet Based Audio Steganography using Data History , 2008, 2008 IEEE Region 10 and the Third international Conference on Industrial and Information Systems.
[5] André R. S. Marçal,et al. A Steganographic Method for Digital Images Robust to RS Steganalysis , 2005, ICIAR.
[6] K. Jemili,et al. Data hiding within audio signals , 1999, 4th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services. TELSIKS'99 (Cat. No.99EX365).
[7] Bo Wang,et al. A chaos-based steganography algorithm for H.264 standard video sequences , 2008, 2008 International Conference on Communications, Circuits and Systems.
[8] Wen-Hsiang Tsai,et al. A New Steganographic Method for Data Hiding in Microsoft Word Documents by a Change Tracking Technique , 2007, IEEE Transactions on Information Forensics and Security.
[9] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[10] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[11] Chin-Chen Chang,et al. A steganographic method for digital images using side match , 2004, Pattern Recognit. Lett..
[12] S. Ramakrishnan,et al. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image , 2014, Int. J. Netw. Secur..
[13] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[14] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[15] Hui Li,et al. Reversible data hiding based on block median preservation , 2011, Inf. Sci..
[16] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[17] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[18] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[19] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[20] A.A. Hanafy,et al. A secure covert communication model based on video steganography , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[21] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .