Entry Johnson:1998:SIC from lncs1998b.bib
Last update: Mon Mar 13 02:22:45 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Johnson:1998:SIC,
author = "Neil F. Johnson and Sushil Jajodia",
title = "Steganalysis of Images Created Using Current
Steganography Software",
journal = j-LECT-NOTES-COMP-SCI,
volume = "1525",
pages = "273--289",
year = "1998",
CODEN = "LNCSD9",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Tue Feb 5 11:53:18 MST 2002",
bibsource = "http://link.springer-ny.com/link/service/series/0558/tocs/t1525.htm;
http://www.math.utah.edu/pub/tex/bib/lncs1998b.bib",
URL = "http://link.springer-ny.com/link/service/series/0558/bibs/1525/15250273.htm;
http://link.springer-ny.com/link/service/series/0558/papers/1525/15250273.pdf",
acknowledgement = ack-nhfb,
keywords = "IH; information hiding",
}
Related entries
- current,
1454(0)1,
1470(0)234,
1497(0)63
- hiding,
1525(0)1,
1525(0)16,
1525(0)32,
1525(0)48,
1525(0)62,
1525(0)73,
1525(0)83,
1525(0)99,
1525(0)111,
1525(0)124,
1525(0)143,
1525(0)158,
1525(0)169,
1525(0)191,
1525(0)208,
1525(0)218,
1525(0)239,
1525(0)258,
1525(0)290,
1525(0)306,
1525(0)319,
1525(0)329,
1525(0)344,
1525(0)355,
1541(0)1
- IH,
1525(0)1,
1525(0)16,
1525(0)32,
1525(0)48,
1525(0)62,
1525(0)73,
1525(0)83,
1525(0)99,
1525(0)111,
1525(0)124,
1525(0)143,
1525(0)158,
1525(0)169,
1525(0)191,
1525(0)208,
1525(0)218,
1525(0)239,
1525(0)258,
1525(0)290,
1525(0)306,
1525(0)319,
1525(0)329,
1525(0)344,
1525(0)355
- Image,
1451(0)15,
1451(0)31,
1451(0)149,
1451(0)262,
1451(0)322,
1451(0)329,
1451(0)366,
1451(0)453,
1451(0)468,
1451(0)540,
1451(0)630,
1451(0)795,
1451(0)805,
1451(0)815,
1451(0)913,
1451(0)929,
1451(0)1005,
1451(0)1029,
1460(0)226,
1460(0)501,
1464(0)3,
1464(0)33,
1464(0)96,
1464(0)124,
1464(0)195,
1464(0)207,
1470(0)92,
1470(0)102,
1478(0)287,
1482(0)406,
1482(0)436,
1482(0)490,
1483(0)113,
1483(0)113-1,
1483(0)137,
1483(0)149,
1484(0)253,
1488(0)251,
1488(0)437,
1496(0)92,
1496(0)177,
1496(0)232,
1496(0)241,
1496(0)317,
1496(0)317-1,
1496(0)325,
1496(0)404,
1496(0)449,
1496(0)481,
1496(0)519,
1496(0)531,
1496(0)539,
1496(0)562,
1496(0)598,
1496(0)753,
1496(0)770,
1496(0)780,
1496(0)861,
1496(0)918,
1496(0)1067,
1496(0)1075,
1496(0)1087,
1496(0)1099,
1496(0)1107,
1496(0)1115,
1496(0)1144,
1496(0)1153,
1496(0)1174,
1496(0)1184,
1496(0)1205,
1496(0)1213,
1506(0)139,
1506(0)236,
1506(0)266,
1508(0)57,
1508(0)110,
1508(0)185,
1508(0)199,
1513(0)645,
1520(0)295,
1525(0)48,
1525(0)169,
1525(0)191,
1525(0)258,
1525(0)290,
1531(0)494,
1531(0)626,
1532(0)198,
1533(0)149,
1537(0)128,
1537(0)140,
1537(0)199,
1537(0)254,
1541(0)447
- software,
1452(0)606-1,
1452(0)611,
1454(0)19,
1454(0)348,
1454(0)440,
1460(0)240,
1460(0)460,
1469(0)27,
1469(0)37,
1469(0)37-1,
1470(0)521,
1482(0)258,
1482(0)288,
1482(0)520,
1487(0)1,
1487(0)28,
1487(0)43,
1487(0)60,
1487(0)92,
1487(0)100,
1487(0)111,
1487(0)122,
1487(0)143,
1487(0)149,
1487(0)150,
1487(0)151,
1488(0)76,
1490(0)170,
1492(0)438,
1494(0)413,
1505(0)83,
1507(0)1,
1510(0)121,
1511(0)107,
1513(0)791,
1514(0)80,
1515(0)21,
1516(0)16,
1516(0)77,
1516(0)128,
1516(0)143,
1516(0)209,
1516(0)284,
1516(0)329,
1521(0)1,
1521(0)19,
1521(0)54,
1521(0)240,
1525(0)111,
1526(0)1,
1526(0)43,
1526(0)69,
1526(0)121,
1526(0)155,
1526(0)179,
1526(0)203,
1531(0)33,
1541(0)248,
1541(0)255,
1543(0)145,
1543(0)149
- Steganalysis,
1525(0)319
- Steganography,
1525(0)32,
1525(0)306,
1525(0)355