共 12 条
- [1] On the limits of steganography [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 474 - 481
- [2] Gutte R.S., 2013, ICTACT J COMMUNICATI, V4, P685
- [3] Islam M. R., 2014, IEEE C INF EL VIS
- [4] Li B, 2011, J. Inf. Hiding Multim. Signal Process., V2, P142
- [5] Maiti Chandreyee, 2011, DATA HIDING IMAGES U, P195, DOI [10.1007/978-3-642- 27183- 0_21, DOI 10.1007/978-3-642-27183-0_21]
- [6] Nag A, 2011, COMM COM INF SC, V191, P620
- [7] PADMAPRIYA S, 2012, INT J COMPUTER SCI T, V3, P1202
- [8] Swain G., 2011, IEEE T IMAGE PROCESS, P84
- [9] Swain G., 2010, IJCCT, V2
- [10] A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 842 - +