共 12 条
[2]
Gutte R.S., 2013, ICTACT J COMMUNICATI, V4, P685
[3]
Islam M. R., 2014, IEEE C INF EL VIS
[4]
Li B, 2011, J. Inf. Hiding Multim. Signal Process., V2, P142
[5]
Maiti Chandreyee, 2011, DATA HIDING IMAGES U, P195, DOI [10.1007/978-3-642- 27183- 0_21, DOI 10.1007/978-3-642-27183-0_21]
[6]
Nag A, 2011, COMM COM INF SC, V191, P620
[7]
PADMAPRIYA S, 2012, INT J COMPUTER SCI T, V3, P1202
[8]
Swain G., 2011, IEEE T IMAGE PROCESS, P84
[9]
Swain G., 2010, IJCCT, V2
[10]
A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher
[J].
MEMS, NANO AND SMART SYSTEMS, PTS 1-6,
2012, 403-408
:842-+