Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography
暂无分享,去创建一个
[1] Anand Jayant Kulkarni,et al. Constrained cohort intelligence using static and dynamic penalty function approach for mechanical components design , 2016, Int. J. Parallel Emergent Distributed Syst..
[2] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[3] Donald E. Grierson,et al. Comparison among five evolutionary-based optimization algorithms , 2005, Adv. Eng. Informatics.
[4] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[5] Ying He,et al. Steganography with pixel-value differencing and modulus function based on PSO , 2018, J. Inf. Secur. Appl..
[6] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[7] S. Wu,et al. Steady-state genetic algorithms for discrete optimization of trusses , 1995 .
[8] Anand Jayant Kulkarni,et al. Solving 0–1 Knapsack Problem using Cohort Intelligence Algorithm , 2016, Int. J. Mach. Learn. Cybern..
[9] Anand Jayant Kulkarni,et al. Variations of cohort intelligence , 2018, Soft Comput..
[10] Yilin Pang,et al. A high capacity steganographic method based on quantization table modification , 2011, Wuhan University Journal of Natural Sciences.
[11] Raveendran Paramesran,et al. A hybrid approach for data clustering based on modified cohort intelligence and K-means , 2014, Expert Syst. Appl..
[12] Anand Jayant Kulkarni,et al. Cohort Intelligence: A Self Supervised Learning Behavior , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[13] Hedieh Sajedi,et al. Image steganalysis using Artificial Bee Colony algorithm , 2017, J. Exp. Theor. Artif. Intell..
[14] Anand J. Kulkarni,et al. Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods , 2018 .
[15] Yijun Yan,et al. Fusion of block and keypoints based approaches for effective copy-move image forgery detection , 2016, Multidimens. Syst. Signal Process..
[16] Anand Jayant Kulkarni,et al. JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms , 2018, Inf. Sci..
[17] D. Jude Hemanth,et al. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems , 2016 .
[18] Jamshid Shanbehzadeh,et al. High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .
[19] Wasan Shaker Awad,et al. Information Hiding Using Ant Colony Optimization Algorithm , 2011, Int. J. Technol. Diffusion.
[20] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[21] Hideki Noda,et al. A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme , 2006, EJC.
[22] Xin Liao,et al. Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.
[23] Chin-Chen Chang,et al. Steganography using JPEG-compressed images , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[24] Robert Jarusek,et al. Robust steganographic method based on unconventional approach of neural networks , 2018, Appl. Soft Comput..
[25] S. Wu,et al. GENETIC ALGORITHMS FOR NONLINEAR MIXED DISCRETE-INTEGER OPTIMIZATION PROBLEMS VIA META-GENETIC PARAMETER OPTIMIZATION , 1995 .
[26] Shen Wang,et al. A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..
[27] Medha Kulkarni,et al. An information hiding system using 16*16 quantization table , 2015, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).
[28] Feng Liu,et al. A heuristic particle swarm optimization method for truss structures with discrete variables , 2009 .
[29] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[30] Umesh Ghanekar,et al. Image steganography based on Canny edge detection, dilation operator and hybrid coding , 2018, J. Inf. Secur. Appl..
[31] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[32] Anand Jayant Kulkarni,et al. Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm , 2018, Neural Computing and Applications.
[33] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[34] Mohamed A. El-Dosuky,et al. Jpeg Image Compression Using Discrete Cosine Transform - A Survey , 2014, ArXiv.
[35] Riccardo Poli,et al. Particle swarm optimization , 1995, Swarm Intelligence.
[36] Thomas Stützle,et al. Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .
[37] D. Pham,et al. Honey Bees Inspired Optimization Method: The Bees Algorithm , 2013, Insects.
[38] Zheng Qin,et al. Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..
[39] Anand J. Kulkarni,et al. Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems , 2016, Eur. J. Oper. Res..
[40] Ajith Abraham,et al. Cohort Intelligence: A Socio-inspired Optimization Method , 2016, Intelligent Systems Reference Library.
[41] Robert M. Hierons,et al. JPEG Steganography: A Performance Evaluation of Quantization Tables , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[42] Kang Tai,et al. Probability collectives for solving discrete and mixed variable problems , 2016, Int. J. Comput. Aided Eng. Technol..
[43] John Miano,et al. Compressed image file formats - JPEG, PNG, GIF, XBM, BMP , 1999 .
[44] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[45] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[46] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[47] J.-S. Coron. What Is Cryptography? , 2006, IEEE Secur. Priv..
[48] Weiming Zhang,et al. Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.
[49] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[50] Anand Jayant Kulkarni,et al. Cohort intelligence algorithm for discrete and mixed variable engineering problems , 2018, Int. J. Parallel Emergent Distributed Syst..
[51] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[52] Yazan Aljeroudi,et al. Extreme learning machine based optimal embedding location finder for image steganography , 2017, PloS one.
[53] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[54] Della Baby,et al. A Novel DWT Based Image Securing Method Using Steganography , 2015 .
[55] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[56] Rainer Böhme,et al. Principles of Modern Steganography and Steganalysis , 2010 .
[57] Wei Liang,et al. JPEG image steganalysis using joint discrete cosine transform domain features , 2010, J. Electronic Imaging.
[58] Rina Mishra,et al. A review on steganography and cryptography , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[59] Nameer N. El-Emam. New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization , 2015, Comput. Secur..