共 11 条
[1]
[Anonymous], 2012, IEEE T INF FORENSICS
[2]
Bas P., 2011, P 13 INF HID C PRAG, V6958, DOI 10.1007/978-3-642- 24178-9_5
[3]
Cancelli G, 2008, 2008 IEEE 10TH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, VOLS 1 AND 2, P795, DOI 10.1109/MMSP.2008.4665182
[4]
Filler T., 2011, MED WAT SEC FOR 13 P, V7880, pF 1
[6]
Fridrich J., 2011, LECT NOTES COMPUTER, V6958
[7]
Practical methods for minimizing embedding impact in steganography
[J].
SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS IX,
2007, 6505
[9]
Kodovsky J, 2011, MM&SEC 11: PROCEEDINGS OF THE 2011 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, P69
[10]
Kodovsky J, 2008, MM&SEC'08: PROCEEDINGS OF THE MULTIMEDIA & SECURITY WORKSHOP 2008, P123, DOI 10.1145/1411328.1411352