A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function
暂无分享,去创建一个
Jiahao Liu | Sheng Zhou | Ge Jiao | Ning Luo
[1] Ge Jiao,et al. Hybrid Chaotic Encryption Algorithm for Securing DICOM Systems , 2019, International Journal of Performability Engineering.
[2] Mingqiang Bai,et al. Cyclic joint remote state preparation in noisy environment , 2018, Quantum Inf. Process..
[3] Phil Sallee,et al. Model-Based Steganography , 2003, IWDW.
[4] Xingming Sun,et al. A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .
[5] Li-Hua Gong,et al. Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system , 2020, Optics and Lasers in Engineering.
[6] Lang Li,et al. Improved Security for Android System based on Multi-Chaotic Maps using a Novel Image Encryption Algorithm , 2019 .
[7] Ajay Jadhav,et al. Steganography An Art of Hiding Data , 2009, ArXiv.
[8] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[9] Jessica J. Fridrich,et al. Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.
[10] Jessica J. Fridrich,et al. Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).
[11] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[12] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[13] Bin Li,et al. A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).
[14] Xingyu Yan,et al. Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system , 2018, Quantum Information Processing.
[15] Sung Wook Baik,et al. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.
[16] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[17] Hamid Sharif,et al. A video steganography attack using multi-dimensional Discrete Spring Transform , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.
[18] Heung-Kyu Lee,et al. Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..
[19] Ge Jiao,et al. Image Encryption with The Cross Diffusion of Two Chaotic Maps , 2019, KSII Trans. Internet Inf. Syst..
[20] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[21] Ming Li,et al. Colour light field image encryption based on DNA sequences and chaotic systems , 2020 .
[22] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[23] Hao Jiang,et al. Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging , 2018, Optics and Lasers in Engineering.