Overview of Digital Steganography Methods and Its Applications
暂无分享,去创建一个
[1] J. Krenn,et al. Steganography and Steganalysis , 2006 .
[2] Heung-Kyu Lee,et al. Improved Steganographic Method Preserving Pixel-Value Differencing Histogram with Modulus Function , 2010, EURASIP J. Adv. Signal Process..
[3] Weiming Zhang,et al. A Double Layered “Plus-Minus One” Data Embedding Scheme , 2007, IEEE Signal Processing Letters.
[4] Merrill Warkentin,et al. Steganography and Steganalysis , 2006 .
[5] Sushil Jajodia,et al. Steganalysis of Images Created Using Current Steganography Software , 1998, Information Hiding.
[6] Jessica J. Fridrich,et al. Grid Colorings in Steganography , 2007, IEEE Transactions on Information Theory.
[7] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[8] Hany Farid,et al. Detecting hidden messages using higher-order statistical models , 2002, Proceedings. International Conference on Image Processing.
[9] Heung-Kyu Lee,et al. Steganalytic Measures for the Steganography Using Pixel-Value Differencing and Modulus Function , 2008, PCM.
[10] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[11] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[12] Gulve Avinash,et al. A Image Steganography Method with Five Pixel Pair Differencing and Modulus Function , 2013 .
[13] J. K. Mandal,et al. Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Through Exclusion of Overflow/Underflow , 2012, ArXiv.
[14] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[15] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[16] Deepa Kundur,et al. Digital video steganalysis exploiting collusion sensitivity , 2004, SPIE Defense + Commercial Sensing.
[17] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[18] Chin-Feng Lee,et al. A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..
[19] Bret Dunbar,et al. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment , 2002 .
[20] Te-Ming Tu,et al. A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..
[21] Hong-Juan Zhang,et al. A Novel Image Steganography Algorithm Against Statistical Analysis , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[22] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[23] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[24] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[25] HwangMin-Shiang,et al. A high quality steganographic method with pixel-value differencing and modulus function , 2008 .
[26] Mee Young Sung,et al. Steganography using block-based adaptive threshold , 2007, 2007 22nd international symposium on computer and information sciences.
[27] K GulveAvinash,et al. A Image Steganography Method with Five Pixel Pair Differencing and Modulus Function , 2013 .