共 123 条
- [1] Abbood EA., 2018, INT J ELECTR COMPUT, V8, P2091
- [2] Abdali N. M., 2020, PROC 30 INT TELECOMM, P1
- [3] Abood May H., 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), P86, DOI 10.1109/NTICT.2017.7976154
- [4] Almohammad A., 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications (IPTA 2010), P215, DOI 10.1109/IPTA.2010.5586786
- [6] On the limits of steganography [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
- [7] [Anonymous], 2013, ISRN Signal Processing, DOI [DOI 10.1155/2013/905685, 10.1155/2013/905685]
- [8] Ansari A. S., 2019, International Journal of Computer Network and Information Security, V11, P11, DOI 10.5815/ijcnis.2019.01.02
- [9] Anupriya A., 2018, INT J COMPUT SCI TRE, V6, P160
- [10] Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File [J]. IACSIT-SC 2009: INTERNATIONAL ASSOCIATION OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY - SPRING CONFERENCE, 2009, : 437 - 441