Optimizing least-significant-bit substitution using cat swarm optimization strategy
暂无分享,去创建一个
[1] Jeng-Shyang Pan,et al. Robust image watermarking based on multiple description vector quantisation , 2004 .
[2] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[3] Mathieu Serrurier,et al. Improving inductive logic programming by using simulated annealing , 2008, Inf. Sci..
[4] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[5] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[6] Yujia Wang,et al. Particle swarm optimization with preference order ranking for multi-objective optimization , 2009, Inf. Sci..
[7] Ihsan Kaya,et al. A genetic algorithm approach to determine the sample size for attribute control charts , 2009, Inf. Sci..
[8] Jeng-Shyang Pan,et al. Reversible Data Hiding Using the Companding Technique and Improved DE Method , 2008 .
[9] Shu-Chuan Chu,et al. COMPUTATIONAL INTELLIGENCE BASED ON THE BEHAVIOR OF CATS , 2007 .
[10] Man Young Rhee. Cryptography and Secure Communications , 1993 .
[11] Harold Joseph Highland,et al. Data encryption: A non-mathematical approach , 1997, Comput. Secur..
[12] R. Davis,et al. The data encryption standard in perspective , 1978, IEEE Communications Society Magazine.
[13] Yao Zhao,et al. Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs , 2008, IEEE Signal Processing Letters.
[14] Paul H. Calamai,et al. Exchange strategies for multiple Ant Colony System , 2007, Inf. Sci..
[15] C. Chang,et al. Hiding secret data adaptively in vector quantisation index tables , 2006 .
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] Jeng-Shyang Pan,et al. Robust VQ-based digital watermarking for memoryless binary symmetric channel , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).