-
1
-
-
0032680807
-
Information hiding-a survey
-
F. A. P. Petitcolas, R.J. Aderson, M. G. Kuhn, "Information hiding-a survey," Proceedings of IEEE, Vol. 87, No.7, pp. 1062-1078, 1999.
-
(1999)
Proceedings of IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Aderson, R.J.2
Kuhn, M.G.3
-
2
-
-
0011994605
-
Detecting steganographic content on the Internet,
-
University of Michigan, USA, pp
-
N. Provos, P. Honeyman, "Detecting steganographic content on the Internet," Technical Report Center for Information Technology Integration, University of Michigan, USA, pp.1-11, 2001.
-
(2001)
Technical Report Center for Information Technology Integration
, pp. 1-11
-
-
Provos, N.1
Honeyman, P.2
-
3
-
-
48049117608
-
A Steganography Techniques Based on Three Chaos System
-
in Chinese
-
H. C. Wang, "A Steganography Techniques Based on Three Chaos System," J. of Control and Automation (in Chinese), Vol. 22, No. 33, pp. 83-85, 2006.
-
(2006)
J. of Control and Automation
, vol.22
, Issue.33
, pp. 83-85
-
-
Wang, H.C.1
-
4
-
-
45849154260
-
Steganography in compressed video stream
-
C. Y. Xu, X. J. Ping, T. Zhang, "Steganography in compressed video stream,"Proc. of the First International Conference on Inovative Computing, Information and Control, Vol. 1, pp. 269-272, 2006.
-
(2006)
Proc. of the First International Conference on Inovative Computing, Information and Control
, vol.1
, pp. 269-272
-
-
Xu, C.Y.1
Ping, X.J.2
Zhang, T.3
-
5
-
-
84957894605
-
Steganography in a video conferencing system
-
A. Westfeld, G. Wolf, "Steganography in a video conferencing system," Proc. of Information Hiding, Vol. 1525, pp. 32-47, 1998.
-
(1998)
Proc. of Information Hiding
, vol.1525
, pp. 32-47
-
-
Westfeld, A.1
Wolf, G.2
-
7
-
-
0038305222
-
The use of steganography to enhance error detection and correction in MPEG-2 video
-
D. L.Robie, N. Wu, R. M.Mersereau, "The use of steganography to enhance error detection and correction in MPEG-2 video," J. of Signals, Systems and Computers, Vol. 2, pp. 1204-1209, 2002.
-
(2002)
J. of Signals, Systems and Computers
, vol.2
, pp. 1204-1209
-
-
Robie, D.L.1
Wu, N.2
Mersereau, R.M.3
-
8
-
-
48049083381
-
Survey of steganography in video
-
in Chinese
-
C. Y. Xu, X. J.Ping, T. Zhang, "Survey of steganography in video," J. of Application Research of Computers (in Chinese), Vol. 12, pp. 8-11, 2005.
-
(2005)
J. of Application Research of Computers
, vol.12
, pp. 8-11
-
-
Xu, C.Y.1
Ping, X.J.2
Zhang, T.3
-
9
-
-
58149167134
-
-
ITU-T Rec. H.264 - ISO/IEC 14496-10 AVC. Draft ITU-T recommendation and final draft international standard of joint video specification, 2003.
-
ITU-T Rec. H.264 - ISO/IEC 14496-10 AVC. Draft ITU-T recommendation and final draft international standard of joint video specification, 2003.
-
-
-
-
10
-
-
33745179542
-
Blind video watermarking scheme based on direct current component in discrete cosine transformation domain
-
in Chinese
-
L. S. Liu, R. H. Li, "Blind video watermarking scheme based on direct current component in discrete cosine transformation domain ," Journal of Xián Jiaotong University, China (in Chinese), Vol. 40, No. 4,pp. 402-405, 2006.
-
(2006)
Journal of Xián Jiaotong University, China
, vol.40
, Issue.4
, pp. 402-405
-
-
Liu, L.S.1
Li, R.H.2
-
11
-
-
0005105932
-
F5-A steganographic algorithm
-
Proc. of 4th International Conference on Information Hiding, Springer-Verlag: Berlin
-
A. Westfeld, "F5-A steganographic algorithm," Proc. of 4th International Conference on Information Hiding, in: Lecture Notes in Computer Science, Springer-Verlag: Berlin, Vol. 2137, pp. 289-302, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2137
, pp. 289-302
-
-
Westfeld, A.1
|