A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function

[1]  Ge Jiao,et al.  Hybrid Chaotic Encryption Algorithm for Securing DICOM Systems , 2019, International Journal of Performability Engineering.

[2]  Mingqiang Bai,et al.  Cyclic joint remote state preparation in noisy environment , 2018, Quantum Inf. Process..

[3]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[4]  Xingming Sun,et al.  A High-Capacity Image Data Hiding Scheme Using Adaptive LSB Substitution , 2009 .

[5]  Li-Hua Gong,et al.  Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyper-chaotic system , 2020, Optics and Lasers in Engineering.

[6]  Lang Li,et al.  Improved Security for Android System based on Multi-Chaotic Maps using a Novel Image Encryption Algorithm , 2019 .

[7]  Ajay Jadhav,et al.  Steganography An Art of Hiding Data , 2009, ArXiv.

[8]  Jessica J. Fridrich,et al.  Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.

[9]  Jessica J. Fridrich,et al.  Content-Adaptive Steganography by Minimizing Statistical Detectability , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[11]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[13]  Bin Li,et al.  A new cost function for spatial image steganography , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[14]  Xingyu Yan,et al.  Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system , 2018, Quantum Information Processing.

[15]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[16]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[17]  Hamid Sharif,et al.  A video steganography attack using multi-dimensional Discrete Spring Transform , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.

[18]  Heung-Kyu Lee,et al.  Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..

[19]  Ge Jiao,et al.  Image Encryption with The Cross Diffusion of Two Chaotic Maps , 2019, KSII Trans. Internet Inf. Syst..

[20]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[21]  Ming Li,et al.  Colour light field image encryption based on DNA sequences and chaotic systems , 2020 .

[22]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[23]  Hao Jiang,et al.  Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging , 2018, Optics and Lasers in Engineering.