共 50 条
- [21] Enhance the image sharing with steganography and authentication [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1177 - +
- [22] Secret sharing systems with authentication-based steganography [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1146 - +
- [23] Authentication of Encrypted Secret Information in Image Steganography [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
- [24] Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images [J]. IEEE ACCESS, 2020, 8 : 129347 - 129358
- [25] An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):
- [26] K Out of N Secret Sharing Scheme with Steganography and Authentication [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 413 - 425
- [28] A Steganography Framework for Easy Secret Sharing through Images [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 309 - 312
- [29] Hiding Secret Data into an AMBTC-Compressed Image Using Genetic Algorithm [J]. 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 321 - +