1 |
Niels Provos, Peter Honeyman, 'Hide and Seek: An Introduction to Steganography,' IEEE Security and Privacy, vol. 1, no. 3, pp. 32-44, May, 2003
DOI
ScienceOn
|
2 |
Westfeld A., 'F5: A steganographic algorithm: High capacity despite better steganalysis,' Lecture Notes in Computer Science, vol. 2137, pp. 289-302, 2001
DOI
ScienceOn
|
3 |
Solanki K., Sarkar A., Manjunath B. S., 'YASS: Yet another steganographic scheme that resists blind steganalysis,' Proceedings of the 9th International Workshop on Information Hiding, Saint Malo, Brittany, France, pp.16-31, 2007
|
4 |
Thien, C.C., Lin, J.C., 2002. Secret image sharing. Computers & Graphics, 26 (1), 765–770
DOI
ScienceOn
|
5 |
Chang, C.C., Hwang, R.J., 1998. Sharing secret images using shadow codebooks. Information Sciences 111 (1–4), 335–345
DOI
ScienceOn
|
6 |
Feng, J.B., Wu, H.C., Tsai, C.S., Chu, Y.P., 2005. A new multi-secret images sharing scheme using Largrange's interpolation. The Journal of Systems & Software 76 (3), 327–339
DOI
ScienceOn
|
7 |
Fridrich J., Goljan M., and Hogea H., 'Attacking the OutGuess,' Proceedings of the ACM Workshop on Multimedia and Security, pp. 967-982, 2002
|
8 |
Westfeld A., and Pfitzmann A., 'Attacks on steganographic systems,' Lecture Notes in Computer Science, vol. 1768, pp. 61-75, 2000
DOI
ScienceOn
|
9 |
Shamir, A., 1979. How to share a secret. Communications of the Association for Computing Machinery, 612–613
|
10 |
Lin, C.C., Tsai, W.H., 2004. Secret image sharing with steganography and authentication. Journal of Systems & Software 73 (3), 405–414
DOI
ScienceOn
|
11 |
Sallee P., 'Model-based steganography,' Lecture Notes in Computer Science, vol. 2939, pp. 154-167, 2004
DOI
ScienceOn
|
12 |
Raja, K.B.; Vikas; Venugopal, K.R.; Patnaik, L.M., High Capacity Lossless Secure Image Steganography using Wavelets, International Conference on Advanced Computing and Communications, vo., Issue , 20-23 Dec. 2006 Page(s):230 - 235
|