Multimedia Data Hiding Evaluation Metrics
暂无分享,去创建一个
[1] Azeddine Beghdadi,et al. Statistical Analysis of Image Quality Metrics for Watermark Transparency Assessment , 2010, PCM.
[2] Xiu-ying Ma,et al. Imperceptibility Evaluation for Color Stego Image , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[3] Akram M. Zeki,et al. An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[4] Wael M. Badawy,et al. A Tool for Robustness Evaluation of Image Watermarking Algorithms , 2008, SCSS.
[5] Hossein Rouhani Zeidanloo,et al. Genetic Audio Watermarking , 2010, BAIP.
[6] Saman Shojae Chaeikar,et al. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks , 2012 .
[7] Fan Zhang,et al. Quality Evaluation of Digital Image Watermarking , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[8] Francesco G. B. De Natale,et al. GA-Based Robustness Evaluation Method for Digital Image Watermarking , 2007, IWDW.
[9] Mazdak Zamani,et al. An overview on audio steganography techniques , 2012 .
[10] V. L. Reddy,et al. Implementation of LSB Steganography and its Evaluation for Various File Formats , 2011 .
[11] Hossein Rouhani Zeidanloo,et al. Genetic substitution-based audio steganography for high capacity applications , 2011 .
[12] Akram M. Zeki,et al. A Genetic-Algorithm-Based Approach for Audio Steganography , 2009 .
[13] Jana Dittmann,et al. Transparency benchmarking on audio watermarks and steganography , 2006, Electronic Imaging.
[14] Mazdak Zamani,et al. Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[15] Akram M. Zeki,et al. A robust watermark embedding in smooth areas , 2011 .
[16] Chokri Ben Amar,et al. A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain , 2010, The 10th IEEE International Symposium on Signal Processing and Information Technology.
[17] Akram M. Zeki,et al. An artificial-intelligence-based approach for audio steganography , 2009 .
[18] Azizah Bt Abdul Manaf,et al. Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).
[19] Akram M. Zeki,et al. A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[20] Mazdak Zamani,et al. Correlation between PSNR and bit per sample rate in audio steganography , 2012 .
[21] Hossein Rouhani Zeidanloo,et al. Genetic Audio Steganography Azizah , 2010 .
[22] Smriti Gupta,et al. A PERFORMANCE EVALUATION OF JPEG STEGANOGRAPHY TECHNIQUES , 2011 .
[23] Mazdak Zamani,et al. Knots of substitution techniques of audio steganography , 2009 .
[24] Shahidan M. Abdullah,et al. Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .
[25] Hossein Rouhani Zeidanloo,et al. A Novel Approach for Genetic Audio Watermarking , 2010 .
[26] Mazdak Zamani,et al. Integration of chaotic map and confusion technique for color medical image encryption , 2010, 6th International Conference on Digital Content, Multimedia Technology and its Applications.
[27] Kevin Curran,et al. An evaluation of image based steganography methods using visual inspection and automated detection techniques , 2006, Multimedia Tools and Applications.
[28] Qingzhong Liu,et al. Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..
[29] Hossein Rouhani Zeidanloo,et al. Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.
[30] Akram M. Zeki,et al. Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.
[31] Namita Tiwari,et al. Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .
[32] Akram M. Zeki,et al. A Novel Approach for Audio Watermarking , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[33] Akram M. Zeki,et al. Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography , 2009, IEEE Games Entertainment Media Conference.
[34] Mazdak Zamani,et al. Improving the security of protected wireless internet access from insider attacks , 2012 .
[35] Mazdak Zamani,et al. Correlation between PSNR and size ratio in audio steganography , 2012 .
[36] Kazuhiro Kondo. Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[37] Mazdak Zamani,et al. Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques , 2010 .
[38] Mojtaba Alizadeh,et al. A Survey on Attacks in RFID Networks , 2012 .