Stem steganographi$ (all stems)
6 papers:
- SEKE-2013-AlviD #classification #fuzzy #image #using
- Image Steganography Using Fuzzy Domain Transformation and Pixel Classification (AKA, RD), pp. 277–282.
- SAC-2013-JangJHJKJ #android
- Protecting Android applications with steganography-based software watermarking (JJ, HJ, JH, JJ, DK, SKJ), pp. 1657–1658.
- SAC-2008-YuB #detection #effectiveness #multi #performance
- A fast and effective method to detect multiple least significant bits steganography (XY, NB), pp. 1443–1447.
- ICPR-v2-2006-LiuSXR #complexity #feature model #image
- Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography (QL, AHS, JX, BR), pp. 267–270.
- ICPR-v4-2004-YuWT #estimation #on the
- On Estimation of Secret Message Length in JSteg-like Steganography (XY, YW, TT), pp. 673–676.
- ICPR-v1-2002-NiimiNKE #image
- Luminance Quasi-Preserving Color Quantization for Digital Steganography to Palette-Based Images (MN, HN, EK, ROE), pp. 252–254.