共 44 条
[2]
Alam S, 2015, 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), P332, DOI 10.1109/ICACEA.2015.7164725
[3]
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[4]
[Anonymous], 2014, T DATA HIDING MULTIM
[6]
Sharing secrets in stego images with authentication
[J].
PATTERN RECOGNITION,
2008, 41 (10)
:3130-3137