Cite

[1] ARNOLD, M.-SCHMUCKER, M.-WOLTHUSEN, S.: Techniques and Applications ofDigital Watermarking and Content Protection. Artech House, London, 2003.Search in Google Scholar

[2] CHANDRAMOULI, R.-KHARAZZI, M.-MEMON, N.: Image steganography and steganalysis:concepts and practice, in: Internat. Workshop on Digital Watermarking- -IWDW ’03 (T. Kalker et al., eds.), Lecture Notes in Computer Science, Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49.Search in Google Scholar

[3] FRIDRICH, J.-GOLJAN, M.-DU, R.: Reliable detection of LSB steganography ingrayscale, in: Proc. of the 2001 Workshop on Multimedia and Security: New Challenges ACM New York, NY, 2001, pp. 27-30.Search in Google Scholar

[4] ZHANG,W.-ZHANG, X.-WANG, S.: Maximizing steganographic embedding efficiencyby combining hamming codes and wet paper codes, in: Information Hiding: 10th International Workshop-IH ’08, Lecture Notes in Comput. Sci., Vol. 5284, Springer-Verlag, Berlin, 2008, pp. 60-71.Search in Google Scholar

[5] MURRAY, J.: Encyklopédie Grafických Formátů, Computer Press, Brno, 1997. (In Czech)Search in Google Scholar

[6] CCITT: Digital compression and coding of continuous-tone still images, part 1: requirementsand guidelines, in: ISO/IEC IS 10918-1.Search in Google Scholar

ISSN:
1210-3195
Language:
English
Publication timeframe:
3 times per year
Journal Subjects:
Mathematics, General Mathematics