共 35 条
[5]
Lossless Data Hiding Based on Histogram Modification for Image Authentication
[J].
EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 1, MAIN CONFERENCE,
2008,
:506-+
[7]
Invertible authentication
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III,
2001, 4314
:197-208
[9]
Goljan M., 2001, 4th Information Hiding Workshop, LNCS, V2137, P27, DOI DOI 10.1007/3-540-45496-9