-
1
-
-
0032680807
-
Information hiding - A survey
-
F A P Petitcolas, R J Anderson, M G Kuhn. Information Hiding-A Survey[J]. Proceedings of IEEE, 1999, 87(7): 1062-1078.
-
(1999)
Proceedings of IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
2
-
-
0030384775
-
A Lu techniques for data hiding
-
W Bender, D Gruhl, N Morimoto, A Lu Techniques for Data Hiding[J]. IBM System Journal, 1996, 35(3, 4): 313-336.
-
(1996)
IBM System Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
3
-
-
0037410595
-
A steganographic method for images by pixel-value differencing
-
D C Wu, W H Tsai. A Steganographic Method for Images by Pixel-Value Differencing[J]. Pattern Recognition Letters, 2003, 24(9, 10): 1613-1626.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.9-10
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
4
-
-
0005105932
-
F5 - A steganographic algorithm
-
Heidelberg, Berlin, Springer-Verlag
-
A Westfeld. F5-A Steganographic Algorithm[A]. In 4th International Workshop on Information Hiding, Lecture Notes in Computer Science 2137[C]. Heidelberg, Berlin, Springer-Verlag, 2001, 289-302.
-
(2001)
4th International Workshop on Information Hiding, Lecture Notes in Computer Science 2137
, pp. 289-302
-
-
Westfeld, A.1
-
5
-
-
0036034444
-
Practical steganalysis of digital images-state of the art
-
San Jose, USA: SPIE
-
J Fridrich, M Goljan. Practical Steganalysis of Digital Images-State of the Art[A]. In: Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE 4675[C]. San Jose, USA: SPIE, 2002, 1-13.
-
(2002)
Security and Watermarking of Multimedia Contents IV, Proceedings of SPIE 4675
, pp. 1-13
-
-
Fridrich, J.1
Goljan, M.2
-
7
-
-
0347355319
-
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security
-
X Zhang, S Wang. Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security[J]. Pattern Recognition Letters, 2004, 25(3): 331-339.
-
(2004)
Pattern Recognition Letters
, vol.25
, Issue.3
, pp. 331-339
-
-
Zhang, X.1
Wang, S.2
-
8
-
-
21144432330
-
Steganography with least histogram abnormality
-
Heidelberg, Berlin: Springer-Verlag
-
X Zhang, S Wang, K Zhang. Steganography with Least Histogram Abnormality[A]. In Computer Network Security, Lecture Notes in Computer Science 2776[C]. Heidelberg, Berlin: Springer-Verlag, 2003, 395-406.
-
(2003)
Computer Network Security, Lecture Notes in Computer Science 2776
, pp. 395-406
-
-
Zhang, X.1
Wang, S.2
Zhang, K.3
-
9
-
-
11444265136
-
Steganographic technique capable of withstanding RQP analysis
-
S Wang, X Zhang, K Zhang. Steganographic Technique Capable of Withstanding RQP Analysis[J]. Journal of Shanghai University, 2002, 6(4): 273-277.
-
(2002)
Journal of Shanghai University
, vol.6
, Issue.4
, pp. 273-277
-
-
Wang, S.1
Zhang, X.2
Zhang, K.3
-
10
-
-
11444269071
-
-
http://www.darkside.com.au/gifshuffle/
-
-
-
-
11
-
-
84918846088
-
EZ stego
-
R Machado. EZ Stego. http://www.stego.com/
-
-
-
Machado, R.1
-
12
-
-
1542363250
-
A new steganographic method for palette images
-
Savannah, Georgia, USA: IS and T
-
J Fridrich, M Goljan. A New Steganographic Method for Palette Images[A]. In Proceedings of IS and T PICS[C]. Savannah, Georgia, USA: IS and T, 1999, 285-289.
-
(1999)
Proceedings of IS and T PICS
, pp. 285-289
-
-
Fridrich, J.1
Goljan, M.2
-
14
-
-
84892764719
-
Attacks on steganographic systems: Breaking the steganographic utilities ezstego, jsteg, stegnos, and s-tools-and some lessons learned
-
New York, Springer-Verlag
-
A Westfeld, A Pfitzmann. Attacks on Steganographic Systems: Breaking the Steganographic Utilities EzStego, Jsteg, Stegnos, and S-Tools-and Some Lessons Learned[A]. In The 3rd Information Hiding Workshop, Lecture Notes in Computer Science 1768[C]. New York, Springer-Verlag, 2000, 61-76.
-
(2000)
The 3rd Information Hiding Workshop, Lecture Notes in Computer Science 1768
, pp. 61-76
-
-
Westfeld, A.1
Pfitzmann, A.2
|