共 13 条
[1]
Ahmed Jassim Mohmmed, 2011, IJCSNS INT 18 J COMP, V11
[2]
Amitava Nag, INT J COMPUTER SCI S, V4, P561
[3]
[Anonymous], 2010, INT J COMPUTER APPL, DOI DOI 10.5120/644-900
[4]
Atul K., 2008, CRYPTOGRAPHY NETWORK
[5]
Chandramouli R., 2003, International Workshop on Digital Watermarking, P35
[6]
Chen P.Y., 2006, INT J APPL SCI ENG, V4, P275, DOI DOI 10.6703/IJASE/2006.4(3).275
[7]
Hossain M., 2009, P 2009 12 INT C COMP
[8]
Jhonson Neil F., EXPLORING STEGANOGRA
[9]
Masud Karim S. M., 14 INT C COMP INF TE
[10]
Data security using data hiding
[J].
ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS,
2007,
:247-+