-
1
-
-
0030384775
-
Techniques for data hiding[J]
-
10.1147/sj.353.0313
-
W Bender D Gruhl N Morimoto, et al. 1996 Techniques for data hiding[J] IBM System Journal 35 3, 4 313 336 10.1147/sj.353.0313
-
(1996)
IBM System Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
2
-
-
84947943261
-
Protecting digital media content [J]
-
10.1145/278476.278485
-
N Memon P W Wong 1998 Protecting digital media content [J] Communications of the ACM 41 7 34 43 10.1145/278476.278485
-
(1998)
Communications of the ACM
, vol.41
, Issue.7
, pp. 34-43
-
-
Memon, N.1
Wong, P.W.2
-
3
-
-
0031996445
-
Exploring steganography: Seeing the unseen[j]
-
N F Johnson S Jajodia 1998 Exploring steganography: seeing the unseen[j] IEEE Computer 31 2 26 34
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, N.F.1
Jajodia, S.2
-
4
-
-
3042742327
-
Hide and seek: An introduction to steganography [J]
-
10.1109/MSECP.2003.1203220
-
N Provos P Honeyman 2003 Hide and seek: an introduction to steganography [J] IEEE Security and Privacy 1 3 32 44 10.1109/MSECP.2003.1203220
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
6
-
-
11844252006
-
Cyber warfare: Steganography vs. steganalysis[J]
-
10.1145/1022594.1022597
-
H Wang S. Wang 2004 Cyber warfare: steganography vs. steganalysis[J] Communication of the ACM 47 10 76 82 10.1145/1022594.1022597
-
(2004)
Communication of the ACM
, vol.47
, Issue.10
, pp. 76-82
-
-
Wang, H.1
Wang, S.2
-
7
-
-
0036168261
-
What infoSec professionals should know about information warfare tactics by terrorists[J]
-
G L Kovacich A Jones 2002 What infoSec professionals should know about information warfare tactics by terrorists[J] Computers and Security 21 1,2 35 41
-
(2002)
Computers and Security
, vol.21
, Issue.1-2
, pp. 35-41
-
-
Kovacich, G.L.1
Jones, A.2
-
11
-
-
47849102609
-
Steganalysis against LSB insertion using statistical method [J]
-
(in Chinese)
-
X Zhang S Wang K Zhang 2004 Steganalysis against LSB insertion using statistical method [J] Journal of Applied Sciences 22 1 16 19 (in Chinese)
-
(2004)
Journal of Applied Sciences
, vol.22
, Issue.1
, pp. 16-19
-
-
Zhang, X.1
Wang, S.2
Zhang, K.3
-
12
-
-
34248328309
-
A novel LSB steganography scheme against statistical analysis [J]
-
(in Chinese)
-
X Zhang S Wang K Zhang 2003 A novel LSB steganography scheme against statistical analysis [J] Journal of Image and Graphics 8 9 1055 1060 (in Chinese)
-
(2003)
Journal of Image and Graphics
, vol.8
, Issue.9
, pp. 1055-1060
-
-
Zhang, X.1
Wang, S.2
Zhang, K.3
-
13
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images[J]
-
10.1109/LSP.2005.847889
-
A D Ker 2005 Steganalysis of LSB matching in grayscale images[J] IEEE Signal Processing Letters 12 6 441 444 10.1109/LSP.2005.847889
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.6
, pp. 441-444
-
-
Ker, A.D.1
-
14
-
-
0242576328
-
Higher-order statistical steganalysis of palette images[A]
-
10.1117/12.476813
-
J Harmsen W Pearlman 2003 Higher-order statistical steganalysis of palette images[A] Proceedings of SPIE[C] 5 020 131 142 10.1117/12.476813
-
(2003)
Proceedings of SPIE[C]
, vol.5020
, pp. 131-142
-
-
Harmsen, J.1
Pearlman, W.2
-
16
-
-
11444265136
-
Steganographic technique capable of withstanding RQP analysis [J]
-
10.1007/s11741-002-0049-5
-
S Wang X Zhang K Zhang 2002 Steganographic technique capable of withstanding RQP analysis [J] Journal of Shanghai University (English Edition) 6 4 273 277 10.1007/s11741-002-0049-5
-
(2002)
Journal of Shanghai University (English Edition)
, vol.6
, Issue.4
, pp. 273-277
-
-
Wang, S.1
Zhang, X.2
Zhang, K.3
-
17
-
-
85084160704
-
Defending against statistical steganalysis[A]
-
Washington D C
-
Provos N. Defending against statistical steganalysis[A]. Proc. of 10th USENIX Security Symposium [C]. Washington D C, 2001, 323-335.
-
(2001)
Proc. of 10th USENIX Security Symposium [C]
, pp. 323-335
-
-
Provos, N.1
-
19
-
-
0037410595
-
A steganographic method for images by pixel-value differencing[J]
-
1048.68040 10.1016/S0167-8655(02)00402-6
-
D C Wu W H Tsai 2003 A steganographic method for images by pixel-value differencing[J] Pattern Recognition Letters 24 1613 1626 1048.68040 10.1016/S0167-8655(02)00402-6
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1613-1626
-
-
Wu, D.C.1
Tsai, W.H.2
-
20
-
-
0347355319
-
Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security [J]
-
10.1016/j.patrec.2003.10.014
-
X Zhang S Wang 2004 Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security [J] Pattern Recognition Letters 25 331 339 10.1016/j.patrec.2003.10.014
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 331-339
-
-
Zhang, X.1
Wang, S.2
-
21
-
-
4544351078
-
A steganographic method for digital images using side match[J]
-
10.1016/j.patrec.2004.05.006
-
C C Chang H W Tseng 2004 A steganographic method for digital images using side match[J] Pattern Recognition Letters 25 1431 1437 10.1016/j.patrec.2004. 05.006
-
(2004)
Pattern Recognition Letters
, vol.25
, pp. 1431-1437
-
-
Chang, C.C.1
Tseng, H.W.2
-
23
-
-
84940448623
-
Secure steganographic methods for palette images[J]
-
10.1007/10719724-4
-
J Fridrich D Rui 2000 Secure steganographic methods for palette images[J] Lecture Notes in Computer Science 1768 47 60 10.1007/10719724-4
-
(2000)
Lecture Notes in Computer Science
, vol.1768
, pp. 47-60
-
-
Fridrich, J.1
Rui, D.2
-
24
-
-
11444249168
-
Detection of OPA stego-data and secure steganography in palette images[J]
-
(in Chinese)
-
X Zhang S Wang 2004 Detection of OPA stego-data and secure steganography in palette images[J] Acta Electronica Sinica 32 10 1702 1705 (in Chinese)
-
(2004)
Acta Electronica Sinica
, vol.32
, Issue.10
, pp. 1702-1705
-
-
Zhang, X.1
Wang, S.2
-
25
-
-
0035766166
-
Steganalysis based on JPEG compatibility [A]
-
10.1117/12.448213
-
J Fridrich M Goljan R Du 2001 Steganalysis based on JPEG compatibility [A] Proceedings of SPIE[C] 4518 275 280 10.1117/12.448213
-
(2001)
Proceedings of SPIE[C]
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
29
-
-
84868000045
-
Lossless data hiding in JPEG images [J]
-
(in Chinese)
-
X Zhang S Wang 2003 Lossless data hiding in JPEG images [J] Journal of Image and Graphics 8 563 566 (in Chinese)
-
(2003)
Journal of Image and Graphics
, vol.8
, pp. 563-566
-
-
Zhang, X.1
Wang, S.2
-
30
-
-
0036959092
-
Application of bit-plane decomposition steganography to JPEG 2000 encoded images [J]
-
10.1109/LSP.2002.806056
-
N Noda J Spaulding M N Shirazi, et al. 2002 Application of bit-plane decomposition steganography to JPEG 2000 encoded images [J] IEEE Signal Processing Letters 9 410 413 10.1109/LSP.2002.806056
-
(2002)
IEEE Signal Processing Letters
, vol.9
, pp. 410-413
-
-
Noda, N.1
Spaulding, J.2
Shirazi, M.N.3
-
31
-
-
11844253853
-
Steganography using multiple-base notational system and human vision sensitivity [J]
-
10.1109/LSP.2004.838214
-
X Zhang S Wang 2005 Steganography using multiple-base notational system and human vision sensitivity [J] IEEE Signal Processing Letters 12 1 67 70 10.1109/LSP.2004.838214
-
(2005)
IEEE Signal Processing Letters
, vol.12
, Issue.1
, pp. 67-70
-
-
Zhang, X.1
Wang, S.2
-
34
-
-
33745294586
-
Method of hiding information in agglutinative language documents using adjustment to new line positions[J]
-
Q Takizawa O Takizawa K Makino, et al. 2005 Method of hiding information in agglutinative language documents using adjustment to new line positions[J] LNCS/LNAI 3683 1039 1048
-
(2005)
LNCS/LNAI
, vol.3683
, pp. 1039-1048
-
-
Takizawa, Q.1
Takizawa, O.2
Makino, K.3
-
35
-
-
84867988550
-
Data hiding in text file using TeX and fxtraction of hidden data from document image [J]
-
(to appear, in Chinese)
-
Chen C, Wang S, Zhang X. Data hiding in text file using TeX and fxtraction of hidden data from document image [J]. Journal of Applied Sciences (to appear, in Chinese).
-
Journal of Applied Sciences
-
-
Chen, C.1
Wang, S.2
Zhang, X.3
|