Second-order steganographic method based on adaptive reference matrix. Yin, Z., Chang, C., Xu, Q., & Luo, B. IET Image Processing (IET-IPR), 9(4):300-305, 2015. Paper bibtex @article{ dblp1710272,
title = {Second-order steganographic method based on adaptive reference matrix},
author = {Zhao-Xia Yin and Chin-Chen Chang and Qin Xu and Bin Luo},
author_short = {Yin, Z. and Chang, C. and Xu, Q. and Luo, B.},
bibtype = {article},
type = {article},
year = {2015},
key = {dblp1710272},
id = {dblp1710272},
biburl = {http://www.dblp.org/rec/bibtex/journals/iet-ipr/YinCXL15},
url = {http://dx.doi.org/10.1049/iet-ipr.2014.0159},
journal = {IET Image Processing (IET-IPR)},
pages = {300-305},
number = {4},
volume = {9},
text = {IET Image Processing (IET-IPR) 9(4):300-305 (2015)}
}
Downloads: 0
{"_id":"eWEECgxRNwQypkd8F","bibbaseid":"yin-chang-xu-luo-secondordersteganographicmethodbasedonadaptivereferencematrix-2015","downloads":0,"creationDate":"2015-10-07T21:59:20.694Z","title":"Second-order steganographic method based on adaptive reference matrix","author_short":["Yin, Z.","Chang, C.","Xu, Q.","Luo, B."],"year":2015,"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/iet-ipr/YinCXL15","bibdata":{"title":"Second-order steganographic method based on adaptive reference matrix","author":["Zhao-Xia Yin","Chin-Chen Chang","Qin Xu","Bin Luo"],"author_short":["Yin, Z.","Chang, C.","Xu, Q.","Luo, B."],"bibtype":"article","type":"article","year":"2015","key":"dblp1710272","id":"dblp1710272","biburl":"http://www.dblp.org/rec/bibtex/journals/iet-ipr/YinCXL15","url":"http://dx.doi.org/10.1049/iet-ipr.2014.0159","journal":"IET Image Processing (IET-IPR)","pages":"300-305","number":"4","volume":"9","text":"IET Image Processing (IET-IPR) 9(4):300-305 (2015)","bibtex":"@article{ dblp1710272,\n title = {Second-order steganographic method based on adaptive reference matrix},\n author = {Zhao-Xia Yin and Chin-Chen Chang and Qin Xu and Bin Luo},\n author_short = {Yin, Z. and Chang, C. and Xu, Q. and Luo, B.},\n bibtype = {article},\n type = {article},\n year = {2015},\n key = {dblp1710272},\n id = {dblp1710272},\n biburl = {http://www.dblp.org/rec/bibtex/journals/iet-ipr/YinCXL15},\n url = {http://dx.doi.org/10.1049/iet-ipr.2014.0159},\n journal = {IET Image Processing (IET-IPR)},\n pages = {300-305},\n number = {4},\n volume = {9},\n text = {IET Image Processing (IET-IPR) 9(4):300-305 (2015)}\n}","bibbaseid":"yin-chang-xu-luo-secondordersteganographicmethodbasedonadaptivereferencematrix-2015","role":"author","urls":{"Paper":"http://dx.doi.org/10.1049/iet-ipr.2014.0159"},"downloads":0},"search_terms":["second","order","steganographic","method","based","adaptive","reference","matrix","yin","chang","xu","luo"],"keywords":[],"authorIDs":["54768775cb4bf04e390012ee"],"dataSources":["8mKT5NyAC9HF4tyPA"]}