共 51 条
- [1] Aabed M.A., Awaideh S.M., Elshafei A.M., Gutub A.A., Arabic diacritics based steganography, Proceedings of the International Conference on Signal Processing and Communications, pp. 756-759, (2007)
- [2] Ahmed M.A., Kiah M.L.M., Zaidan B.B., Zaidan A.A., A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm, J. Applied Sci., 10, pp. 59-64, (2010)
- [3] Al-Azawi A.F., Fadhil M.A., Arabic text steganography using kashida extensions with huffman code, J. Applied Sci., 10, pp. 436-439, (2010)
- [4] Alghathbar K., Code based hashing technique for message authentication algorithms, J. Inform. Assurance Security, 5, pp. 9-20, (2010)
- [5] Aura T., Nikander P., Leiwo J., DOS-Resistant Authentication with Client Puzzles, (2000)
- [6] Bhaumik A.K., Choi M., Robles R.J., Balitanas M.O., Data hiding in video, Int. J. Database Theory Appl., 2, pp. 9-16, (2009)
- [7] Biham E., Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at Eurocrypt'91, (1991)
- [8] Chae J.J., Manjunath B.S., Data hiding in video, Proceedings of the 6th IEEE International Conference on Image Processing, pp. 243-246, (1999)
- [9] Chang C.C., Chen T.S., Cheng L.Z., A steganographic method based upon JPEG and quantization table modification, Inform. Sci., 141, pp. 123-138, (2002)
- [10] Chang C.C., Tseng H.W., Steganographic method for digital images using side match, Pattern Recognition Lett, 25, pp. 1431-1437, (2004)