Multi-resolution Video Steganography Technique Based on Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD)
暂无分享,去创建一个
[1] Shahrokh Ghaemmaghami,et al. High Capacity Image Steganography in Wavelet Domain , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[2] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[3] Tanveer J. Siddiqui,et al. Singular Value Decomposition Based Image Steganography Using Integer Wavelet Transform , 2015, SIRS.
[4] C. P. Sumathi,et al. A Study of Various Steganographic Techniques Used for Information Hiding , 2014, ArXiv.
[5] Ramadhan J. Mstafa,et al. Video steganography techniques: Taxonomy, challenges, and future directions , 2017, 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[6] Anna Geomi George,et al. A Survey on Different Approaches Used In Image Quality Assessment , 2013 .
[7] Mohamed-Jalal Fadili,et al. The Undecimated Wavelet Decomposition and its Reconstruction , 2007, IEEE Transactions on Image Processing.
[8] S. Hemalatha,et al. Comparison of secure and high capacity color image steganography techniques in RGB and YCbCr domains , 2013, ArXiv.
[9] Amara Lynn Graps,et al. An introduction to wavelets , 1995 .
[10] Amal Said Khalifa,et al. Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.
[11] Prashant Dahiwale,et al. Audio-video steganography , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[12] Si Liu,et al. Video steganography: A review , 2019, Neurocomputing.
[13] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[14] Deepak Gupta,et al. Hiding Data in Images Using Cryptography and Deep Neural Network , 2019, Journal of Artificial Intelligence and Systems.
[15] Ramadhan J. Mstafa,et al. A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC , 2017, IEEE Access.
[16] Ming-Shi Wang,et al. A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography , 2009, Comput. Stand. Interfaces.
[17] K. Swaraja,et al. Robust Video Watermarking by amalgamation of Image transforms and optimized Firefly Algorithm , 2016 .