Performance enhanced image steganography systems using transforms and optimization techniques
暂无分享,去创建一个
[1] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[2] Thierry Blu,et al. Fresnelets: new multiresolution wavelet bases for digital holography , 2003, IEEE Trans. Image Process..
[3] Parisa Gerami,et al. Least significant bit image steganography using particle swarm optimization and optical pixel adjustment , 2012 .
[4] Li-Hong Huang,et al. A data hiding scheme using pixel value differencing and improving exploiting modification directions , 2015, Comput. Secur..
[5] S. Hemalatha,et al. A Secure Image Steganography Technique to Hide Multiple Secret Images , 2013, Netcom 2013.
[6] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[7] Rafael C. González,et al. Local Determination of a Moving Contrast Edge , 1985, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Muhammad Nazeer,et al. A Fresnelet-Based Encryption of Medical Images using Arnold Transform , 2013, ArXiv.
[9] Nameer N. El-Emam,et al. New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm , 2013, J. Syst. Softw..
[10] Shyr-Shen Yu,et al. A HDWT-based reversible data hiding method , 2009, J. Syst. Softw..
[11] D. E. Goldberg,et al. Genetic Algorithms in Search , 1989 .
[12] Hedieh Sajedi,et al. Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.
[13] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..
[14] Minh N. Do,et al. Ieee Transactions on Image Processing the Contourlet Transform: an Efficient Directional Multiresolution Image Representation , 2022 .
[15] Xiang Wang,et al. A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition , 2015, Inf. Sci..
[16] Hamidreza Sadreazami,et al. A robust spread spectrum based image watermarking in ridgelet domain , 2012 .
[17] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[18] Wei-Kuan Shih,et al. Wavelet bit-plane based data hiding for compressed images , 2013 .
[19] Punam Bedi,et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..
[20] Mingwei Tang,et al. A high capacity image steganography using multi-layer embedding , 2014 .
[21] Yih-Kai Lin,et al. High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..
[22] Mohammed Ghanbari,et al. A highly robust two-stage Contourlet-based digital image watermarking method , 2013, Signal Process. Image Commun..
[23] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[24] Punam Bedi,et al. Best Hiding Capacity Scheme for Variable Length Messages Using Particle Swarm Optimization , 2010, SEMCCO.
[25] David E. Goldberg,et al. Genetic Algorithms in Search Optimization and Machine Learning , 1988 .
[26] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[27] Hedieh Sajedi,et al. Secure steganography based on embedding capacity , 2009, International Journal of Information Security.