共 11 条
[1]
[Anonymous], LNCS
[2]
Böhme R, 2004, LECT NOTES COMPUT SC, V3193, P125
[3]
Forensic steganalysis: Determining the stego key in spatial domain steganography
[J].
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII,
2005, 5681
:631-642
[4]
Digital image steganography using stochastic modulation
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V,
2003, 5020
:191-202
[5]
Golub G., 1965, Journal of the Society for Industrial and Applied Mathematics, Series B: Numerical Analysis, V2, P205, DOI [10.1137/0702016, DOI 10.1137/0702016]
[6]
He JH, 2006, SCI CHINA SER F, V49, P273, DOI 10.1007/s11432-006-0273-x
[7]
JODAR L, 1991, CONGRESSUS NUMERANTI, P57
[8]
KER AD, 2008, 10 ACM WORKSH MULT S, P27
[9]
Liang Guang-lan, 2007, Journal of Shanghai University, V11, P272, DOI 10.1007/s11741-007-0317-2
[10]
Pevny T., 2006, P SPIE, P257