共 10 条
[1]
Anderson R.J., Petitcolas F.A.P., On the limits of steganography, IEEE Journal on Selected Areas in Communications, 16, 4, pp. 474-481, (1998)
[2]
Chang C.C., Tseng H.W., A steganographic method for digital images using side-match, Pattern Recognition Letters, 25, 12, pp. 1431-1437, (2004)
[3]
Chang C.C., Lin C.Y., Wang Y.Z., New image steganographic methods using run-length approach, Information Sciences, 176, 22, pp. 3393-3408, (2006)
[4]
Gonzalez R.C., Woods R.E., Digital Image Processing, (2002)
[5]
Johnson N.F., Jajodia S., Exploring steganography: Seeing the unseen, Computer Practices, the flagship magazine of the IEEE Computer Society, pp. 26-34, (1998)
[6]
Jung K.H., Yu J.G., Kim S.M., Kim K.J., Byun J.Y., Yoo K.Y., The hiding of secret data using the run length matching method, Proceedings of Agent and Multi-Agent Systems: Technologies and Applications, 4496, pp. 1027-1034, (2007)
[7]
Petitcolas F.A.P., Anderson R.J., Kuhn M.G., Information hiding - a survey, Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, 87, 7, pp. 1062-1078, (1999)
[8]
Wang R.Z., Su C.H., Secret image sharing with smaller shadow images, Pattern Recognition Letters, 27, 6, pp. 551-555, (2006)
[9]
Wu D.C., Tsai W.H., A steganographic method for images by pixel-differencing, Pattern Recognition Letters, 24, 9-10, pp. 1613-1626, (2003)
[10]
Zollner J., Federrath H., Klimant H., Pfitzmann A., Piotraschke R., Westfeld A., Wicke G., Wolf G., Modeling the security of steganographic systems, 2nd Workshop on Information Hiding, pp. 345-355, (1998)