Cryptography Reference
In-Depth Information
Fig. 5.12. Result of the embedding capacity and the PSNR value (cover image:
Midnight).
secret data in the cover image. The experimental results have confirmed that
our new scheme is capable of confirming our claims.
References
1. Anderson, R.J., and Petitcolas F.A.P. (1998): On the limits of steganography.
IEEE Journal on Selected Areas in Communications, 16 , 474481
2. Bender, W., Gruhl D., and Lu, A.: Techniques for data hiding. IBM Systems
Journal, 35 , 313336
3. Petitcolas F.A.P., Anderson R.J., and Kuhn, M.G. (1999): Information hiding
A survey. Proceedings of the IEEE, 87 , 10621078
Search WWH ::




Custom Search