최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기韓國軍事科學技術學會誌 = Journal of the KIMST, v.11 no.3 = no.34, 2008년, pp.115 - 122
정기현 (영진전문대학 컴퓨터정보계열)
Wu and Tsai's pixel-value differencing method and Chang and Tseng's side-match method are based on the theory that the number of bits which can be embedded is determined by the degree of the pixel's smoothness, or its proximity to the edge of the image. If pixels are located in the edge area, they m...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Neil F. Johnson, Sushil Jajodia, Exploring Steganography : Seeing the Unseen, Computer Practices, 26-34, 1998
J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf, Modeling the security of steganographic systems, 2nd Workshop on Information Hiding, 345-355, 1998
W. Bender, N. Morimoto, A. Lu, Techniques for data hiding, IBM Systems Journal, 35(3/4), 313-336, 1996
D. C. Wu, W. H. Tsai, A steganographic method for images by pixel-differencing, Pattern Recognition Letters 24(9-10), 1613-1626, 2003
C. C. Chang, H. W. Tseng, A steganographic method for digital images using side-match, Pattern Recognition Letters 25(12), 1431-1437, 2004
R. C. Gonzalez, R. E. Woods, Digital Image Processing, Prentice Hall, Upper Saddle River, NJ, 2002
R. J. Anderson, F. A. P. Petitcolas, On the limits of steganography, IEEE Journal on Selected Areas in Communications 16, 474-481, 1998
F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, Information hiding - a survey, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7), 1062-1078, 1999
K. H. Jung, J. G. Yu, S. M. Kim, K. J. Kim, J. Y. Byun, K. Y. Yoo, The hiding of secret data using the run length matching method, LNCS, 1027-1034, 2007
Z. Wang, A. C. Bovik, A universal image quality index, IEEE Signal Processing Letters 9, 81-84, 2002
※ AI-Helper는 부적절한 답변을 할 수 있습니다.