High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform
暂无分享,去创建一个
[1] Sushil Kumar,et al. Image Steganogaraphy Based on Complex Double Dual Tree Wavelet Transform , 2013 .
[2] Randa Atta,et al. A high payload steganography mechanism based on wavelet packet transformation and neutrosophic set , 2018, J. Vis. Commun. Image Represent..
[3] De-Shuang Huang,et al. A Constructive Hybrid Structure Optimization Methodology for Radial Basis Probabilistic Neural Networks , 2008, IEEE Transactions on Neural Networks.
[4] Sahib Khan,et al. Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region , 2018 .
[5] Yazan Aljeroudi,et al. Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.
[6] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[7] Peter James Vial,et al. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research , 2019, Neurocomputing.
[8] Malin Premaratne,et al. Image similarity index based on moment invariants of approximation level of discrete wavelet transform , 2012 .
[9] H. Dadgostar,et al. Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB , 2016, J. Inf. Secur. Appl..
[10] Richard Baraniuk,et al. The Dual-tree Complex Wavelet Transform , 2007 .
[11] Qingzhong Liu,et al. Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images , 2014, ACM Trans. Intell. Syst. Technol..
[12] J. K. Mandal,et al. High payload image steganography based on Laplacian of Gaussian (LoG) edge detector , 2018, Multimedia Tools and Applications.
[13] Ahmed Al-Ani,et al. A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..
[14] Vijay H. Mankar,et al. Curvelet transform and cover selection for secure steganography , 2018, Multimedia Tools and Applications.
[15] S. Selvakumar,et al. High payload image steganography with reduced distortion using octonary pixel pairing scheme , 2013, Multimedia Tools and Applications.
[16] Chin-Chen Chang,et al. An adaptive high-fidelity steganographic scheme using edge detection and hybrid hamming codes , 2018, Displays.
[17] Syed Rameez Naqvi,et al. Reversible integer wavelet transform for blind image hiding method , 2017, PloS one.
[18] Parthasarathy Guturu,et al. A class of new KNN methods for low sample problems , 1990, IEEE Trans. Syst. Man Cybern..
[19] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[20] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Driss Aboutajdine,et al. A robust digital image watermarking method using Dual Tree Complex Wavelet Transform , 2008, 2008 IEEE Symposium on Computers and Communications.
[22] De-Shuang Huang,et al. Human face recognition based on multi-features using neural networks committee , 2004, Pattern Recognit. Lett..
[23] Vijay Kumar,et al. A modified DWT-based image steganography technique , 2017, Multimedia Tools and Applications.
[24] Xiaofeng Wang,et al. A Novel Density-Based Clustering Framework by Using Level Set Method , 2009, IEEE Transactions on Knowledge and Data Engineering.
[25] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[26] Xiaofeng Wang,et al. An efficient local Chan-Vese model for image segmentation , 2010, Pattern Recognit..
[27] E Baburaj,et al. Sobel edge detection technique implementation for image steganography analysis , 2018 .
[28] Yu Wang,et al. The LSB-based High Payload Information Steganography , 2015, ICM 2015.
[29] De-Shuang Huang,et al. Improved extreme learning machine for function approximation by encoding a priori information , 2006, Neurocomputing.
[30] Phalguni Gupta,et al. Edge-based image steganography , 2014, EURASIP J. Inf. Secur..
[31] Tanveer J. Siddiqui,et al. Robust image steganography using complex wavelet transform , 2013, IMPACT-2013.