[1]
Z. J. Wu, H. X. Duan, and X. Li. An approach to hide secret speech information, Journal of Shanghai Jiaotong University(Science), vol. 11, pp.134-139. (2012).
Google Scholar
[2]
Y. Chen, F. Qu, J. B. Hu and Z. Chen Density adjustable pseudorandom sequence and its applications in information hiding, " Multimedia Information Networking and Security, MINES , 09. International Conference on, p.91 – 94. (2009).
DOI: 10.1109/mines.2009.94
Google Scholar
[3]
Z. X. Yin, C. C. Chang and Y. P. Zhang. A high embedding efficiency steganography scheme for wet paper codes, 2009 Fifth International Conference on Information Assurance and Security, pp.611-614, (2009).
DOI: 10.1109/ias.2009.93
Google Scholar
[4]
Y. K. Chan, W. T. Chen, and S. S. Yu, A HDWT-based reversible data hiding method , Journal of Systems and Software, vol. 82, p.411–421, March (2009).
DOI: 10.1016/j.jss.2008.07.008
Google Scholar
[5]
C. C. Chang. T. D. Kieu and Y. C. Chou. A high payload steganographic scheme based on (7, 4) hamming code for digital images, Electronic Commerce and Security, International Symposium on, pp.16-20 . (2008).
DOI: 10.1109/isecs.2008.222
Google Scholar
[6]
S. G. Yang and C. X. Li. Text information hiding method based on chaotic map and bch code in dwt domain of a carrier image", Wavelet Analysis and Pattern Recognition, ICWAPR , 07. International Conference on, pp.4-6 . (2011).
DOI: 10.1109/icwapr.2007.4421737
Google Scholar
[7]
J. R. Chen, L. C. Jiao, and J. S. Wu, Projective synchronization with different scale factors in a driven–response complex network and its application in image encryption, Nonlinear Analysis: Real World A-pplications, vol. 11 p.3045–3058, August (2010).
DOI: 10.1016/j.nonrwa.2009.11.003
Google Scholar