共 50 条
- [1] Evaluating Security of Executable Steganography for Digital Software Watermarking [J]. SOUTHEASTCON 2022, 2022, : 666 - 673
- [2] A secure transaction model based on digital steganography and watermarking [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN & COMPUTER GRAPHICS, 1999, : 1314 - 1318
- [3] Data Hiding and Its Applications: Digital Watermarking and Steganography [J]. APPLIED SCIENCES-BASEL, 2021, 11 (22):
- [4] Digital watermarking and steganography via overlays of halftone images [J]. MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION VII, WITH APPLICATIONS, 2004, 5561 : 152 - 163
- [5] Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions [J]. IEEE ACCESS, 2020, 8 : 166589 - 166611
- [6] Secured and Authentic Communication by Combined Approach of Digital Watermarking and Steganography [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 595 - +
- [7] Steganography and watermarking of digital images using singular value decomposition [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2005, 8 (03): : 343 - 353
- [8] FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN, ICCAD, 2022,
- [9] Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (06): : 2985 - 2999
- [10] Performance Analysis of LSB, DCT, and DWT for Digital Watermarking Application using Steganography [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,