共 67 条
[1]
JPEG steganography: a performance evaluation of quantization tables
[J].
2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS,
2009,
:471-478
[2]
[Anonymous], 1999, LECT NOTES COMPUTER, DOI DOI 10.1007/107197245
[3]
Extreme learning machine based optimal embedding location finder for image steganography
[J].
PLOS ONE,
2017, 12 (02)
[4]
Awad Wasan Shaker, 2011, International Journal of Technology Diffusion, V2, P16, DOI 10.4018/jtd.2011010102
[5]
A Novel DWT based Image Securing Method using Steganography
[J].
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014,
2015, 46
:612-618
[6]
Baluja S., 2017, Adv. Neural Inf. Process. Syst, P1
[7]
Bohme R., 2010, ADV STAT STEGANAL IN
[9]
Chandramouli R, 2004, LECT NOTES COMPUT SC, V2939, P35