THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 49 |
Dung lượng | 1,68 MB |
Nội dung
Ngày đăng: 23/09/2020, 21:21
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||
---|---|---|---|---|
[9] Jassim F. A., "Five Modulus Method for Image Compression", Signals and Image Processing: An International Journal (SIPIJ), vol.3, no.5, pp., 2012 | Sách, tạp chí |
|
||
[10] I. Avcibas, N. Memon and B. Sankur, “Steganalysis using Image Quality Metrics,” IEE Transactions on Image Processing, vol. 12, no. 2, pp. 221 – 229, February 2003 | Sách, tạp chí |
|
||
[11] S. Lyu and H. Farid, “Detecting Hidden Messages using Higher-order Statistics and Support Vector Machines,” Lecture Notes in Computer Science, vol. 2578, pp. 340 – 354, 2002 | Sách, tạp chí |
|
||
[1] D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information – hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Securityand Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450 | Khác | |||
[3] T. Jahnke, J. Seitz, (2008). An introduction in digital watermarking applications, principles and problems, in: H. Nemati (Ed), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York:Information Science Reference, 2008, pp. 554-569 | Khác | |||
[4] M. Warkentin, M.B. Schmidt, E. Bekkering, Steganography and steganalysis, Premier reference Source–Intellectual Property Protection for Multimedia Information technology, Chapter XIX, 2008, pp. 374-380 | Khác | |||
[5] N.N. El-Emam, Hiding a large amount of data with high security using steganography algorithm, Journal of Computer Science 3 (2007) 223-232 | Khác | |||
[6] P.Y. Chen, W.E. Wu, A modifed side match scheme for image steganography, International Journal of Applied Science & Engineering 7 (2009) 53-60 | Khác | |||
[7] C.C. Chang, H.W. Tseng, A steganographic method for digital image using side match, Pattern Recognition Letters 25 (2004) 1431-1437 | Khác | |||
[8] P.C. Wu, W.H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters 24 (2003) 1613-1626 | Khác | |||
[12] N.F. Johnson, S. Jajodia, Steganalysis: The investigation of hidden information, in: Proc. IEEE Information Technology Conference, Syracuse, NY, 1998 | Khác | |||
[13] J. Fridrich, M. Goljan, Practical steganalysis of digital images-state of the art, in | Khác | |||
[14] R. Chandramouli, M. Kharrazi, N. Memon, Image steganography and steganalysis: Concepts and practices, in: Proc. 2nd Int. Workshop Digital Watermarking, Seoul, Korea, pp. 35–49, January 2003 | Khác | |||
[15] J. Fridrich, R. Du, L. Meng, Steganalysis of LSB encoding in color images, in: Proc. IEEE Int. Conf. on Multimedia and Expo, New York, July 31–August 2, 2000 | Khác | |||
[16] J. Fridrich, M. Goljan, R. Du, Detecting LSB steganography in color and gray- scale images, IEEE Multimedia Magaz., Special Issue on Security 22–28, 2001 | Khác | |||
[17] T. Zhang, X. Ping, A fast and effective steganalytic technique against JSteg-like algorithms, in: ACM Symposium on Applied Computing, Florida, USA, March 9–12, 2003 | Khác | |||
[18] X. Yu, Y. Wang, T. Tan, On estimation of secret message length in JSteg-like steganography, in: Proc. of 7th ICPR, 2004 | Khác | |||
[19] J. Fridrich, Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes, in: Proc. Inf. Hiding Workshop, Lecture Notes in Computer Science, vol. 3200, Springer, pp. 67–81, 2004 | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN