共 28 条
[2]
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V4986, P84
[3]
Blakley G. R., 1979, AFIPS Conference Proceedings, vol.48. 1979 National Computer Conference, P313, DOI 10.1109/MARK.1979.8817296
[4]
Sharing secrets in stego images with authentication
[J].
PATTERN RECOGNITION,
2008, 41 (10)
:3130-3137
[6]
Chen CC, 2007, 2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, P515
[7]
Chen CC, 2008, J INF SCI ENG, V24, P1567
[9]
Dehkordi MH, 2008, INFORM SCIENCES, V178, P2262, DOI 10.1016/j.ins.2007.11.031