Biometric Inspired Digital Image Steganography
暂无分享,去创建一个
Kevin Curran | Joan Condell | Abbas Cheddad | Paul Mc Kevitt | J. Condell | P. Kevitt | K. Curran | A. Cheddad
[1] Yonggwan Won,et al. Efficient and Automatic Faces Detection Based on Skin-Tone and Neural Network Model , 2002, IEA/AIE.
[2] Lisa M. Marvel,et al. A methodology for data hiding using images , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).
[3] Alexandros Eleftheriadis,et al. MPEG‐4: An object‐based multimedia coding standard supporting mobile applications , 1998, Mob. Networks Appl..
[4] Peter Wayner,et al. Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition) , 2002 .
[5] Nasir D. Memon,et al. Image Steganalysis with Binary Similarity Measures , 2002, Proceedings. International Conference on Image Processing.
[6] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[7] Edward J. Delp,et al. A Review of Data Hiding in Digital Images , 1999, PICS.
[8] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[9] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[10] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[11] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[12] Chin-Chen Chang,et al. An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.
[13] Xingang You,et al. Steganalysis of Palette Images: Attack Optimal Parity Assignment Algorithm , 2005, 2005 5th International Conference on Information Communications & Signal Processing.
[14] Wen-Yuan Chen,et al. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..
[15] Zheng Zhang,et al. Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[16] S. Han,et al. Fingerprinted secret sharing steganography for robustness against image cropping attacks , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[17] Ioannis Pitas,et al. Extraction of facial regions and features using color and shape information , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[18] T. Thomas. Al Qaeda and the Internet: The Danger of “Cyberplanning” , 2003, Parameters.
[19] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[20] Stanislaw Osowski,et al. Higher order statistics and neural network for tremor recognition , 2002, IEEE Transactions on Biomedical Engineering.
[21] Jessica J. Fridrich,et al. Steganalysis of JPEG Images: Breaking the F5 Algorithm , 2002, Information Hiding.
[22] Ioannis Pitas,et al. Face localization and facial feature extraction based on shape and color information , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[23] K. R. Rao,et al. Exploring steganography for low bit rate wavelet based coder in image retrieval system , 2000, 2000 TENCON Proceedings. Intelligent Systems and Technologies for the New Millennium (Cat. No.00CH37119).
[24] Mohammad Hassan Shirali-Shahreza,et al. A New Approach to Persian/Arabic Text Steganography , 2006, 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06).
[25] N. K. Abdulaziz,et al. Robust data hiding for images , 2000, WCC 2000 - ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No.00EX420).
[26] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[27] S.B. Sadkhan. Cryptography : current status and future trends , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..
[28] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[29] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[30] Anil K. Jain,et al. Face Detection in Color Images , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[31] Paul Alvarez,et al. Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis , 2004, Int. J. Digit. EVid..
[32] Juan E. Tapiador,et al. Steganography in games: A general methodology and its application to the game of Go , 2006, Comput. Secur..
[33] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[34] A.I. Hashad,et al. A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.
[35] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[36] Jessica J. Fridrich,et al. Reliable detection of LSB steganography in color and grayscale images , 2001, MM&Sec '01.
[37] Hany Farid,et al. Statistical Tools for Digital Forensics , 2004, Information Hiding.
[38] Kevin Curran,et al. A Comparative Analysis of Steganographic Tools. , 2007 .
[39] Walter Bender,et al. Applications for data hiding , 2000, IBM Syst. J..
[40] John McHugh,et al. A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[41] M. Jamzad,et al. A robust steganography algorithm based on texture similarity using Gabor filter , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..