메뉴 건너뛰기




Volumn 2105, Issue , 2001, Pages 427-435

Lossy compression tolerant steganography

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; STEGANOGRAPHY;

EID: 84958756763     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47749-7_34     Document Type: Conference Paper
Times cited : (9)

References (9)
  • 1
    • 84958827066 scopus 로고
    • The New Testament Revised Standard Version And Chinese Union Version
    • The New Testament Revised Standard Version And Chinese Union Version: The Gospel According to Matthew Chapter3, pp. 5-7 (1985).
    • (1985) The Gospel according to Matthew Chapter3 , pp. 5-7
  • 3
  • 4
    • 0032187555 scopus 로고    scopus 로고
    • Virtual Image Cryptosystem Based upon Vector Quantization
    • Oct
    • T. S. Chen, C. C. Chang, and M. S. Hwang (Oct.1998), “Virtual Image Cryptosystem Based upon Vector Quantization,” IEEE Transactions onf Image Processing, Vol. 7, No. 10, pp. 1485-1488.
    • (1998) IEEE Transactions Onf Image Processing , vol.7 , Issue.10 , pp. 1485-1488
    • Chen, T.S.1    Chang, C.C.2    Hwang, M.S.3
  • 7
    • 0031996445 scopus 로고    scopus 로고
    • Exploring Steganography: Seeing the Unseen
    • Feb
    • N. F. Johnson and S. Jajodia (Feb. 1998), “Exploring Steganography: Seeing the Unseen,” IEEE Computer Magazine, Vol. 31, NO. 2, pp.26-34.
    • (1998) IEEE Computer Magazine , vol.31 , Issue.2 , pp. 26-34
    • Johnson, N.F.1    Jajodia, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.