A Hybrid Image steganography method based on genetic algorithm
暂无分享,去创建一个
[1] Shailender Gupta,et al. Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .
[2] Ahmed Patel,et al. Design and evaluation of a hybrid system for detection and prediction of faults in electrical transformers , 2015 .
[3] Bin Luo,et al. MDE-based image steganography with large embedding capacity , 2016, Secur. Commun. Networks.
[4] R. Umarani,et al. A Study on Digital Image Steganography , 2013 .
[5] S. H. Ali,et al. Miner for OACCR: Case of medical data analysis in knowledge discovery , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).
[6] Nurhayati,et al. Steganography for inserting message on digital image using least significant bit and AES cryptographic algorithm , 2016, 2016 4th International Conference on Cyber and IT Service Management.
[7] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[8] Pallavi Sharma,et al. A Secure Text Communication Scheme Based on Combination of Compression, Cryptography, and Steganography , 2016 .
[9] Samaher Hussein Ali. Novel Approach for Generating the Key of Stream Cipher System Using Random Forest Data Mining Algorithm , 2013, 2013 Sixth International Conference on Developments in eSystems Engineering.
[10] A. Korshunov,et al. Keyterm extraction from microblogs' messages using Wikipedia-based keyphraseness measure , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).
[11] Samaher Hussein Ali,et al. A novel tool (FP-KC) for handle the three main dimensions reduction and association rule mining , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).
[12] Machigar Ongtang,et al. Elitism Enhancements for Genetic Algorithm based Network Intrusion Detection System , 2013 .
[13] Liang Xiao,et al. Sensor-Assisted Security in Cognitive Radio Networks , 2013 .
[14] Ahmed Patel,et al. Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments , 2014, 2014 International Congress on Technology, Communication and Knowledge (ICTCK).
[15] Jing Dong,et al. Two Notes from Experimental Study on Image Steganalysis , 2013, ICIC.
[16] Janahanlal Stephen,et al. Genetic Algorithm based Mosaic Image Steganography for Enhanced Security , 2014 .
[17] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..