共 20 条
- [1] Amirtharajan Rengarajan, 2012, Journal of Applied Sciences, V12, P428, DOI 10.3923/jas.2012.428.439
- [3] [Anonymous], 2007, Applied Cryptography: Protocols, Algorithms, and Source Code in C
- [5] Hiding data in images by simple LSB substitution [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
- [8] EI Safys RO, 2009, P ICNM 2009, P11
- [9] Fazli S., 2010, 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2010), P377, DOI 10.1109/ICUMT.2010.5676610
- [10] Katzenbeisser S, 2000, DIGITAL WATERMARKING, P2