Have a personal or library account? Click to login
Image-based jpeg steganography Cover

References

  1. [1] ARNOLD, M.-SCHMUCKER, M.-WOLTHUSEN, S.: Techniques and Applications ofDigital Watermarking and Content Protection. Artech House, London, 2003.
  2. [2] CHANDRAMOULI, R.-KHARAZZI, M.-MEMON, N.: Image steganography and steganalysis:concepts and practice, in: Internat. Workshop on Digital Watermarking- -IWDW ’03 (T. Kalker et al., eds.), Lecture Notes in Computer Science, Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.
  3. [3] FRIDRICH, J.-GOLJAN, M.-DU, R.: Reliable detection of LSB steganography ingrayscale, in: Proc. of the 2001 Workshop on Multimedia and Security: New Challenges ACM New York, NY, 2001, pp. 27-30.
  4. [4] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiencyby combining hamming codes and wet paper codes, in: Information Hiding: 10th International Workshop-IH ’08, Lecture Notes in Comput. Sci., Vol. 5284, Springer-Verlag, Berlin, 2008, pp. 60-71.
  5. [5] MURRAY, J.: Encyklopédie Grafických Formátů, Computer Press, Brno, 1997. (In Czech)
  6. [6] CCITT: Digital compression and coding of continuous-tone still images, part 1: requirementsand guidelines, in: ISO/IEC IS 10918-1.
DOI: https://doi.org/10.2478/v10127-010-0006-9 | Journal eISSN: 1338-9750 | Journal ISSN: 12103195
Language: English
Page range: 65 - 74
Published on: Nov 12, 2012
Published by: Slovak Academy of Sciences, Mathematical Institute
In partnership with: Paradigm Publishing Services
Publication frequency: 3 issues per year

© 2012 Matúš Jókay, Tomáš Moravćík, published by Slovak Academy of Sciences, Mathematical Institute
This work is licensed under the Creative Commons License.