共 50 条
- [21] Steganography Attack Based on Discrete Spring Transform and Image Geometrization 2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 554 - 558
- [22] Steganography Based on the Hadamard Transform and Modification of the DEMD 2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,
- [23] High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution APPLIED SCIENCES-BASEL, 2018, 8 (11):
- [24] HIGH CAPACITY STEGANOGRAPHY TECHNIQUE BASED ON WAVELET TRANSFORM PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
- [28] A High-Capacity and High-Security Image Steganography Network Based on Chaotic Mapping and Generative Adversarial Networks APPLIED SCIENCES-BASEL, 2024, 14 (03):
- [29] New Image Steganography Method Based on Haar Discrete Wavelet Transform EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 287 - 297
- [30] Robust Image Steganography Technique Based on Redundant Discrete Wavelet Transform 2012 2ND INTERNATIONAL CONFERENCE ON POWER, CONTROL AND EMBEDDED SYSTEMS (ICPCES 2012), 2012,