A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method
暂无分享,去创建一个
[1] Ahmad T. Al-Taani,et al. A Novel Steganographic Method for Gray-Level Images , 2009 .
[2] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[3] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[4] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[5] Te-Ming Tu,et al. A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..
[6] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[7] E. Chang,et al. Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.
[8] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[9] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[10] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[11] A. S. Thoke,et al. International Journal of Electrical and Computer Engineering 3:16 2008 Fault Classification of Double Circuit Transmission Line Using Artificial Neural Network , 2022 .
[12] Nameer N. El-Emam. Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .
[13] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[14] Jitendra Malik,et al. Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[15] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[16] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[17] Goutam Sanyal,et al. Hiding Data in Images Using Pixel Mapping Method (PMM) , 2010, Security and Management.
[18] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.