共 32 条
- [1] Akhtar Nadeem, 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), P385, DOI 10.1109/CICN.2013.85
- [2] Akhtar N, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), P749, DOI 10.1109/ICICICT.2014.6781374
- [3] Ardiansyah G, 2017, 2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE), P249, DOI 10.1109/ICITISEE.2017.8285505
- [4] A high payload steganographic algorithm based on edge detection [J]. DISPLAYS, 2017, 46 : 42 - 51
- [5] Image Steganography Based on Complemented Message and Inverted bit LSB Substitution [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 832 - 838
- [6] Hiding data in images by simple LSB substitution [J]. PATTERN RECOGNITION, 2004, 37 (03) : 469 - 474
- [8] DICOM Library, 2020, DICOM LIB AN SHAR VI
- [10] Detecting LSB steganography in color and gray-scale images [J]. IEEE Multimedia, 2001, 8 (04) : 22 - 28