High secure digital image steganography based on 3D chaotic map
暂无分享,去创建一个
[1] Yixian Yang,et al. Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[2] Alfredo De Santis,et al. Steganography and Secure Communication on Online Social Networks and Online Photo Sharing , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.
[3] R.T. McKeon,et al. Strange fourier steganography in movies , 2007, 2007 IEEE International Conference on Electro/Information Technology.
[4] M. Vijay,et al. Image steganography algorithm based on Huffman encoding and transform domain method , 2013, 2013 Fifth International Conference on Advanced Computing (ICoAC).
[5] Mohammad Ali Akhaee,et al. One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme , 2014, IET Image Process..
[6] Li Zhiquan,et al. A Robust Chaos-Based DCT-Domain Watermarking Algorithm , 2008, 2008 International Conference on Computer Science and Software Engineering.
[7] A. Kanso,et al. Steganographic algorithm based on a chaotic map , 2012 .
[8] Ali Kanso,et al. A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..
[9] Rosanne English. Comparison of high capacity steganography techniques , 2010, 2010 International Conference of Soft Computing and Pattern Recognition.
[10] K. Gunavathi,et al. Novel and secure encoding and hiding techniques using image steganography: A survey , 2012, 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM).
[11] K. R. Venugopal,et al. Non Embedding Steganography using Average Technique in Transform domain , 2013, 2013 IEEE 9th International Colloquium on Signal Processing and its Applications.
[12] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[13] Amir Akhavan,et al. Applications of tripled chaotic maps in cryptography , 2007, 0705.2633.
[14] Chuankun Wu,et al. Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.
[15] Sanaa Ghouzali,et al. Zero-steganography using DCT and spatial domain , 2013, 2013 ACS International Conference on Computer Systems and Applications (AICCSA).
[16] Xiao Zeng,et al. Reversible Image Watermarking Using Interpolation Technique , 2010, IEEE Transactions on Information Forensics and Security.
[17] Z. Qiu,et al. A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..
[18] K.-C. Liu. Colour image watermarking for tamper proofing and pattern-based recovery , 2012 .
[19] Wen-Yuan Chen,et al. Color image steganography scheme using set partitioning in hierarchical trees coding, digital Fourier transform and adaptive phase modulation , 2007, Appl. Math. Comput..
[20] M. A. Jafarizadeh,et al. Hierarchy of Chaotic Maps with an Invariant Measure , 2001 .
[21] Chandana Gamage,et al. Chaos theory based cryptography in digital image distribution , 2010, 2010 International Conference on Advances in ICT for Emerging Regions (ICTer).