共 18 条
[1]
Randolph C., Barrows J.R., Paul M.D., Clayton D., Review: privacy, confidentiality and electronic medical records, J Am Med Inform Assoc, 3, 2, pp. 139-148, (1996)
[2]
United States Department of Health and Human Services, pp1–19, (2000)
[3]
Raman R.S., Reddy R., Jagannathan V., Reddy S., Cleetus K.J., Srinivas K., A strategy for the development of secure telemedicine applications. In: Proceedings of the AMIA annual fall symposium, pp 344–348, (1997)
[4]
Mohammad A.B.Y., Jantan A., A new steganography approach for image encryption exchange by using the LSB insertion, IJCSNS Int J Comput Sci Netw Secur, 8, 6, pp. 247-254, (2008)
[5]
Martin A., Sapiro G., Seroussi G., Is image steganography natural, IEEE Trans Image Process, 14, 12, pp. 2040-2050, (2005)
[6]
Juneja M., Sandhu P.S., Designing of robust steganography technique based on LSB insertion and encryption, In: Proceedings of international conference on advances in recent technologies in communication and computing pp 302–305 (ISBN: 978-0-7695-38457, (2009)
[7]
Gandharba S., Lenka S.K., A novel steganography technique by mapping words with LSB array, Int J Signal Imaging Syst Eng Indersci 8(1–2) (ISSN, pp. 0701-1748, (2015)
[8]
Gandharba S., Lenka S.K., LSB array based image steganography technique by exploring the four least significant bits. In: Proceedings of 4th international conference, Obcom 2011, CCIS, vol 2(270), pp 479–488 (ISBN: 978-3-642-29216-3), doi:10.1007/978-3-642-29216-3_52.pdf), (2012)
[9]
Wu D.C., Tsai W.H., A steganographic method for images by pixel value differencing, Pattern Recogn Lett, 24, 9-10, pp. 1613-1626, (2003)
[10]
Wang R., Chen Y., High payload image steganography using two-way block matching, IEEE Signal Process Lett, 13, 3, pp. 161-164, (2006)