共 48 条
[1]
Abu-Marie W., 2010, International Journal of Signal and Image Processing, V1, P196
[2]
Acken JM, 1998, COMMUN ACM, V41, P74, DOI 10.1145/278476.278489
[3]
An LSB Substitution with Bit Inversion Steganography Method
[J].
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1,
2016, 43
:515-521
[4]
Al-Otaibi Nouf A., 2014, Lecture Notes on Information Theory, V2, P151, DOI 10.12720/lnit.2.2.151-157
[5]
[Anonymous], 2007, 4 IEEE GCC C EXH GUL
[6]
[Anonymous], 2014, INT C ADV ENG TECHN
[7]
[Anonymous], 2001, INT WORKSH INF HID
[8]
Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
[10]
Circular interpretation of histogram for reversible watermarking
[J].
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING,
2001,
:345-350