An efficient and adaptive data-hiding scheme based on secure random matrix
暂无分享,去创建一个
[1] Yi Mu,et al. Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments , 2017, IEEE Systems Journal.
[2] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[3] Xiaohong Jiang,et al. Secure k-NN Query on Encrypted Cloud Data with Multiple Keys , 2017 .
[4] Yanjun Liu,et al. A Novel Turtle Shell Based Scheme for Data Hiding , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[5] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[6] Jian Shen,et al. Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds , 2019, IEEE Systems Journal.
[7] Chin-Chen Chang,et al. An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.
[8] Jeng-Shyang Pan,et al. Fourth International Conference on Innovative, Computing, Information and Control , 2009 .
[9] Xiao Zhou,et al. Data Hiding Method based on Reference Matrix , 2018 .
[10] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[11] Lina Yao,et al. Collaborative text categorization via exploiting sparse coefficients , 2018, World Wide Web.
[12] X. Zhang,et al. Improved modification direction methods , 2010, Comput. Math. Appl..
[13] Jiann-Der Lee,et al. International Conference on Intelligent Information Hiding and Multimedia Signal Processing , 2008 .
[14] Chin-Chen Chang,et al. Data hiding based on extended turtle shell matrix construction method , 2017, Multimedia Tools and Applications.
[15] Leonardo Palacios-Luengas,et al. A steganographic method using Bernoulli's chaotic maps , 2016, Comput. Electr. Eng..
[16] Tung-Shou Chen,et al. A Minimal Euclidean Distance Searching Technique for Sudoku Steganography , 2008, 2008 International Symposium on Information Science and Engineering.
[17] Hua Wang,et al. Editorial: Special Issue on Security and Privacy of IoT , 2017, World Wide Web.
[18] Aparajita Ojha,et al. Chaotic system-based secure data hiding scheme with high embedding capacity , 2018, Comput. Electr. Eng..
[19] Chin-Chen Chang,et al. An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..
[20] Yanjun Liu,et al. Fast turtle shell-based data embedding mechanisms with good visual quality , 2018, Journal of Real-Time Image Processing.
[21] Mingwu Zhang,et al. Accountable mobile E-commerce scheme in intelligent cloud system transactions , 2018, J. Ambient Intell. Humaniz. Comput..
[22] Jeanne Chen,et al. A PVD-based data hiding method with histogram preserving using pixel pair matching , 2014, Signal Process. Image Commun..
[23] Liang Chang,et al. A secure data backup scheme using multi-factor authentication , 2017, IET Inf. Secur..