earticle

논문검색

Image Steganography via Fully Exploiting Modification Direction

목차

Abstract
 1. Introduction
 2. Related Works
  2.1. EMD Method
  2.2. EMD-2 Method
 3. Main Focus of the Paper
  3.1. Modification Direction Exploiting
 4. Proposed Method
  4.1. Embedding & Extracting
 5. Experimental Results
  5.1. Embedding Capacity
  5.2. Image Quality
  5.3. Security Analysis
 6. Conclusion
 References

저자정보

  • Xuejing Niu Key Laboratory of Intelligent Computing & Signal Processing, School of Computer Science & Technology, Anhui University, Hefei, China
  • Meng Ma Key Laboratory of Intelligent Computing & Signal Processing, School of Computer Science & Technology, Anhui University, Hefei, China
  • Rui Tang Key Laboratory of Intelligent Computing & Signal Processing, School of Computer Science & Technology, Anhui University, Hefei, China
  • Zhaoxia Yin Key Laboratory of Intelligent Computing & Signal Processing, School of Computer Science & Technology, Anhui University, Hefei, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.