共 25 条
[1]
Petitcolas F.A.P., Anderson R.J., Kuhn M.G., Information hiding—a survey, Proc. IEEE, 87, pp. 1062-1078, (1999)
[2]
Wu N.-I., Hwang M.S., Data hiding: current status and key issues, Int. J. Netw. Security, 4, 1, pp. 1-9, (2007)
[3]
Provos N., Honeyman P., Hide and seek—an introduction to steganography, IEEE Secur priv, 1, 3, pp. 32-44, (2003)
[4]
Amin M.M., Salleh M., Ibrahim S., Katmin M.R., Shamsuddin M.Z.I., Information hiding using steganography, IEEE 0-7803-7773-March, (2003)
[5]
Balkrishan A.P., Singh, Java implementation of least significant bit embedding for hiding data. IE(I) J, CP, 89, pp. 28-31, (2008)
[6]
Bolle R., Connel J., Ratha N., Secure data hiding in wavelet compressed fingerprint images. in Proceedings of the, ACM workshops on Multimedia, Los Angeles, California (ACM Press, New York NY, 2000, pp. 127-130, (2000)
[7]
Anderson R.J., Petitcolas F.A.P., On the limits of the steganography, IEEE J. Sel. Areas Commun., 16, 4, pp. 474-481, (2001)
[8]
Cvejic N., Seppanen T., Increasing robustness of LSB audio steganography using a novel embedding method, in Proc. IEEE Int. Conf. Info. Tech. Coding and, Computing, 2, pp. 533-537, (2004)
[9]
Cvejic N., Seppanen T., Increasing the capacity of LSB-based audio steganography, In IEEE Workshop on Multimedia Signal Processing, pp. 336-338, (2002)
[10]
Mohammad P., Ahmad D., LSB-based audio steganography method based on lifting wavelet transform, Proceedings of IEEE International Symposium on Signal Processing and Information Technology, 15–18, pp. 600-603, (2007)