Steganography Combining Data Decomposition Mechanism and Stego-coding Method
暂无分享,去创建一个
[1] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[2] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[3] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[4] Jessica J. Fridrich,et al. Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.
[5] Xinpeng Zhang,et al. Efficient double-layered steganographic embedding , 2007 .
[6] Xinpeng Zhang,et al. Integrated encoding with high efficiency for digital steganography , 2007 .
[7] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Xinpeng Zhang,et al. Dynamical running coding in digital steganography , 2006, IEEE Signal Processing Letters.
[10] Marten van Dijk,et al. Embedding Information in Grayscale Images , 2001 .
[11] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[12] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.