A Review on Image Steganography
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Perturbed quantization steganography , 2005, Multimedia Systems.
[2] Adel Al-Mohammad,et al. Steganography-Based Secret and Reliable Communications: Improving Steganographic Capacity and Imperceptibility , 2010 .
[3] Kevin Curran,et al. A skin tone detection algorithm for an adaptive approach to steganography , 2009, Signal Process..
[4] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[5] Ankita Agarwal. Security Enhancement Scheme for Image Steganography using S-DES Technique , 2012 .
[6] M. Afrakhteh,et al. Adaptive steganography scheme using more surrounding pixels , 2010, 2010 International Conference On Computer Design and Applications.
[7] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[8] Arvind Kumar,et al. Steganography- A Data Hiding Technique , 2010 .
[9] Chin-Chen Chang,et al. An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.
[10] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[11] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[12] Anindya Sarkar,et al. YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.
[13] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[14] Hideki Noda,et al. BPCS steganography using EZW lossy compressed images , 2002, Pattern Recognit. Lett..
[15] Giovanni Battista Porta. Image Steganography and Steganalysis , 2004 .
[16] Geeta Sikka,et al. A New Image Steganography Based On First Component Alteration Technique , 2010, ArXiv.
[17] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[18] Husrev T. Sencar,et al. Image Steganography: Concepts and Practice , 2004 .
[19] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[20] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[21] Heung-Kyu Lee,et al. Multi Bit Plane Image Steganography , 2006, IWDW.
[22] Iuon-Chang Lin,et al. Hiding data in spatial domain images with distortion tolerance , 2009, Comput. Stand. Interfaces.