共 67 条
- [1] Stanley A., ‘Pairs of Values and the Chi-Squared Attack, (2005)
- [2] Cheddad A., Condell J., Curran K., Et al., Digital image steganography: Survey and analysis of current methods, Signal Process, 90, 3, pp. 727-752, (2010)
- [3] Subhedar M.S., Mankar V.H., Current status and key issues in image steganography: A survey, Comput. Sci. Rev., 13-14, pp. 95-113, (2014)
- [4] Johnson N.F., Jajodia S., Exploring steganography: Seeing the unseen, Computer, 31, 2, pp. 26-34, (1998)
- [5] Terror plot horror hidden in porn film, Adelaide Now, (2012)
- [6] Kolata G., Veiled messages of terror may lurk in cyberspace, Science, (2001)
- [7] McCullagh D., Bin Laden: Steganography master?, WIRED
- [8] Shi Y., Li X., Zhang X., Et al., Reversible data hiding: Advances in the past two decades, IEEE Access, 4, pp. 3210-3237, (2016)
- [9] Johnson N., Duric Z., Jajodia S., ‘Information Hiding: Steganography and Watermarking Attacks and Countermeasures, (2000)
- [10] Wayner P., Disappearing Cryptography, (2009)