A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform
暂无分享,去创建一个
Souvik Bhattacharyya | Souvik Bhattacharyya | A. Kshitij | Avinash Prasad Kshitij | Gautom Sanyal | G. Sanyal
[1] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[2] Wim Sweldens,et al. The lifting scheme: a construction of second generation wavelets , 1998 .
[3] Ross J. Anderson. Stretching the Limits of Steganography , 1996, Information Hiding.
[4] Jitendra Malik,et al. Normalized cuts and image segmentation , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[5] I. Daubechies,et al. Wavelet Transforms That Map Integers to Integers , 1998 .
[6] Dale K. Pace,et al. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet , 1998 .
[7] Scott Craver,et al. On Public-Key Steganography in the Presence of an Active Warden , 1998, Information Hiding.
[8] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..
[9] Dirk Roose,et al. Integer wavelet transforms using the lifting scheme , 1999 .
[10] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[11] Yeuan-Kuen Lee,et al. High capacity image steganographic model , 2000 .
[12] Nasir D. Memon,et al. Analysis of LSB based image steganography techniques , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[13] S.T. Maya,et al. Robust steganography using bit plane complexity segmentation , 2004, (ICEEE). 1st International Conference on Electrical and Electronics Engineering, 2004..
[14] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[15] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.