Multimedia Data Hiding Evaluation Metrics

This paper intends to give a literature review on multimedia data hiding, its uses and techniques. It also attempts to give a literature review on steganalysis techniques. Key-Words: multimedia security; digital data hiding; steganography; watermarking

[1]  Azeddine Beghdadi,et al.  Statistical Analysis of Image Quality Metrics for Watermark Transparency Assessment , 2010, PCM.

[2]  Xiu-ying Ma,et al.  Imperceptibility Evaluation for Color Stego Image , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[3]  Akram M. Zeki,et al.  An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[4]  Wael M. Badawy,et al.  A Tool for Robustness Evaluation of Image Watermarking Algorithms , 2008, SCSS.

[5]  Hossein Rouhani Zeidanloo,et al.  Genetic Audio Watermarking , 2010, BAIP.

[6]  Saman Shojae Chaeikar,et al.  Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks , 2012 .

[7]  Fan Zhang,et al.  Quality Evaluation of Digital Image Watermarking , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[8]  Francesco G. B. De Natale,et al.  GA-Based Robustness Evaluation Method for Digital Image Watermarking , 2007, IWDW.

[9]  Mazdak Zamani,et al.  An overview on audio steganography techniques , 2012 .

[10]  V. L. Reddy,et al.  Implementation of LSB Steganography and its Evaluation for Various File Formats , 2011 .

[11]  Hossein Rouhani Zeidanloo,et al.  Genetic substitution-based audio steganography for high capacity applications , 2011 .

[12]  Akram M. Zeki,et al.  A Genetic-Algorithm-Based Approach for Audio Steganography , 2009 .

[13]  Jana Dittmann,et al.  Transparency benchmarking on audio watermarks and steganography , 2006, Electronic Imaging.

[14]  Mazdak Zamani,et al.  Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[15]  Akram M. Zeki,et al.  A robust watermark embedding in smooth areas , 2011 .

[16]  Chokri Ben Amar,et al.  A robust audio watermarking technique based on the perceptual evaluation of audio quality algorithm in the multiresolution domain , 2010, The 10th IEEE International Symposium on Signal Processing and Information Technology.

[17]  Akram M. Zeki,et al.  An artificial-intelligence-based approach for audio steganography , 2009 .

[18]  Azizah Bt Abdul Manaf,et al.  Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[19]  Akram M. Zeki,et al.  A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[20]  Mazdak Zamani,et al.  Correlation between PSNR and bit per sample rate in audio steganography , 2012 .

[21]  Hossein Rouhani Zeidanloo,et al.  Genetic Audio Steganography Azizah , 2010 .

[22]  Smriti Gupta,et al.  A PERFORMANCE EVALUATION OF JPEG STEGANOGRAPHY TECHNIQUES , 2011 .

[23]  Mazdak Zamani,et al.  Knots of substitution techniques of audio steganography , 2009 .

[24]  Shahidan M. Abdullah,et al.  Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .

[25]  Hossein Rouhani Zeidanloo,et al.  A Novel Approach for Genetic Audio Watermarking , 2010 .

[26]  Mazdak Zamani,et al.  Integration of chaotic map and confusion technique for color medical image encryption , 2010, 6th International Conference on Digital Content, Multimedia Technology and its Applications.

[27]  Kevin Curran,et al.  An evaluation of image based steganography methods using visual inspection and automated detection techniques , 2006, Multimedia Tools and Applications.

[28]  Qingzhong Liu,et al.  Image complexity and feature mining for steganalysis of least significant bit matching steganography , 2008, Inf. Sci..

[29]  Hossein Rouhani Zeidanloo,et al.  Interpretative Key Management (IKM), A Novel Framework , 2010, 2010 Second International Conference on Computer Research and Development.

[30]  Akram M. Zeki,et al.  Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.

[31]  Namita Tiwari,et al.  Evaluation of Various LSB based Methods of Image Steganography on GIF File Format , 2010 .

[32]  Akram M. Zeki,et al.  A Novel Approach for Audio Watermarking , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[33]  Akram M. Zeki,et al.  Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography , 2009, IEEE Games Entertainment Media Conference.

[34]  Mazdak Zamani,et al.  Improving the security of protected wireless internet access from insider attacks , 2012 .

[35]  Mazdak Zamani,et al.  Correlation between PSNR and size ratio in audio steganography , 2012 .

[36]  Kazuhiro Kondo Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[37]  Mazdak Zamani,et al.  Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques , 2010 .

[38]  Mojtaba Alizadeh,et al.  A Survey on Attacks in RFID Networks , 2012 .