Substitution steganography with security improved by chaotic image encryption
暂无分享,去创建一个
[1] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[3] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[4] Simon Singh,et al. The Code Book , 1999 .
[5] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[6] A. Pietrikova,et al. Image processing of die attach's X-ray images for automatic voids detection and evaluation , 2016, 2016 39th International Spring Seminar on Electronics Technology (ISSE).
[7] N. Sloane,et al. Some doubly exponential sequences , 1973 .
[8] Jessica J. Fridrich,et al. Steganalysis in high dimensions: fusing classifiers built on random subspaces , 2011, Electronic Imaging.
[9] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[10] Dusan Levicky,et al. A novel JPEG steganography method based on modulus function with histogram analysis , 2012 .
[11] Robert M. May,et al. Simple mathematical models with very complicated dynamics , 1976, Nature.
[12] Valerie Novitzká,et al. Categorical model of structural operational semantics for imperative language , 2016 .
[13] Jessica J. Fridrich,et al. Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.
[14] Mircea Vladutiu,et al. Secret data communication system using steganography, AES and RSA , 2011, 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME).
[15] Ondrej Kovac,et al. Image steganography with using QR code and cryptography , 2016, 2016 26th International Conference Radioelektronika (RADIOELEKTRONIKA).
[16] Andrew D. Ker. Improved Detection of LSB Steganography in Grayscale Images , 2004, Information Hiding.
[17] Tomás Pevný,et al. Merging Markov and DCT features for multi-class JPEG steganalysis , 2007, Electronic Imaging.
[18] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[19] Harsh K. Verma,et al. A hybrid approach for image security by combining encryption and steganography , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[20] Simone Bacellar Leal Ferreira,et al. AES cryptography in color image steganography by genetic algorithms , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[21] Andreja Samÿcovic,et al. ATTACKS ON DIGITAL WAVELET IMAGE WATERMARKS , 2008 .
[22] William Steingartner,et al. Some properties of coalgebras and their role in computer science , 2016 .