Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 6256872, 8 pages
Research Article

A Modification-Free Steganography Method Based on Image Information Entropy

1School of Electronic Information, Wuhan University, Wuhan, China
2College of Physical Science and Technology, Huazhong Normal University, Wuhan, China

Correspondence should be addressed to Jianbin Wu; nc.ude.uncc.liam@nibnaijuw

Received 29 September 2017; Revised 4 December 2017; Accepted 6 February 2018; Published 26 March 2018

Academic Editor: Zhenxing Qian

Copyright © 2018 Xia ShuangKui and Jianbin Wu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [1 citation]

The following is the list of published articles that have cited the current article.

  • Yu Zheng, Jiezhong Zhu, Wei Fang, and Lian-Hua Chi, “Deep Learning Hash for Wireless Multimedia Image Content Security,” Security and Communication Networks, vol. 2018, pp. 1–13, 2018. View at Publisher · View at Google Scholar