共 29 条
[1]
Abbas SA, 2015, 2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), P572, DOI 10.1109/IntelCIS.2015.7397279
[2]
High capacity steganographic method based upon JPEG
[J].
ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY,
2008,
:544-+
[3]
[Anonymous], INT J ADV ENG TECHNO
[4]
[Anonymous], 2010, 2010 2 INT C COMPUTI
[5]
[Anonymous], 2018, International Journal of Engineering & Technology, DOI DOI 10.14419/IJET.V7I1.9.9729
[6]
[Anonymous], 2016, Int. J. Comput. Sci. Inf. Sec
[7]
Awad A, 2017, J ED COLL WASIT U, V1, P497, DOI [10.31185/eduj.Vol1.Iss26.105, DOI 10.31185/EDUJ.VOL1.ISS26.105]
[8]
Bloisi Domenico, 2007, VISAPP 2007. Second International Conference on Computer Vision Theory and Applications, P127
[10]
Chhabra N, 2012, INT J COMPUT SCI NET, V12, P126