共 48 条
- [1] Abu-Marie W., 2010, International Journal of Signal and Image Processing, V1, P196
- [2] Acken JM, 1998, COMMUN ACM, V41, P74, DOI 10.1145/278476.278489
- [3] An LSB Substitution with Bit Inversion Steganography Method [J]. PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 515 - 521
- [4] Al-Otaibi Nouf A., 2014, Lecture Notes on Information Theory, V2, P151, DOI 10.12720/lnit.2.2.151-157
- [5] [Anonymous], 2007, 4 IEEE GCC C EXH GUL
- [6] [Anonymous], 2014, INT C ADV ENG TECHN
- [7] Celik MU, 2002, 2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, P157
- [8] A steganographic method for digital images using side match [J]. PATTERN RECOGNITION LETTERS, 2004, 25 (12) : 1431 - 1437
- [9] Circular interpretation of histogram for reversible watermarking [J]. 2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, : 345 - 350
- [10] Ghouti L, 2007, INT C SEC CRYPT SEC