共 13 条
[1]
Steganography capacity: A steganalysis perspective
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V,
2003, 5020
:173-177
[2]
Chandramouli R, 2001, 2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, P1019, DOI 10.1109/ICIP.2001.958299
[3]
Chorein A., 2008, SILENTEYE STEGANOGRA
[5]
Khalind O., 2014, P SOC PHOTO-OPT INS, V9120
[6]
Luo X., 2006, IEEE 8 INT C ADV COM, V2, P1199
[8]
Stegananlysis method of Two Least-Significant Bits steganography
[J].
ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS,
2009,
:350-353
[9]
Steganalysis of Two Least Significant Bits Embedding Based on Least Square Method
[J].
2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III,
2009,
:124-127
[10]
Westfeld A, 2000, LECT NOTES COMPUT SC, V1768, P61