Robust and secure image steganographic algorithm based on matrix embedding
暂无分享,去创建一个
[1] Alvis Cheuk M. Fong,et al. Multimedia applications of self-synchronizing T-codes , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[2] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[3] Tao Zhang,et al. A Research on Steganography Method Based on Error-Correcting Codes , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[4] Premchander Reddy. Error resilient image transmission using T-codes and edge-embedding , 2007 .
[5] G. R. Higgie. Analysis of the families of variable length self synchronising codes called T-codes , 1991 .
[6] M. R. Titchener,et al. Generalised T-codes : extended construction algorithm for self-synchronising codes , 1996 .
[7] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[8] S.T. Maya,et al. Robust steganography using bit plane complexity segmentation , 2004, (ICEEE). 1st International Conference on Electrical and Electronics Engineering, 2004..
[9] P. Farrell,et al. Essentials of Error-control Coding , 2006 .
[10] Anil Kumar,et al. Application of T-Code, Turbo Codes and Pseudo-Random Sequence for Steganography , 2006 .
[11] Caroline Fontaine,et al. How Reed-Solomon Codes Can Improve Steganographic Schemes , 2009, EURASIP J. Inf. Secur..
[12] Jessica J. Fridrich,et al. Influence of embedding strategies on security of steganographic methods in the JPEG domain , 2008, Electronic Imaging.
[13] S. Manoharan. Towards robust steganography using T-codes , 2003, Proceedings EC-VIP-MC 2003. 4th EURASIP Conference focused on Video/Image Processing and Multimedia Communications (IEEE Cat. No.03EX667).
[14] Ulrich Günther. Robust source coding with generalised T-Codes , 1998 .
[15] Liu Cui-Qing,et al. A Research on the Steganography Capacity of the Reed-Solomon Codes , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[16] Ousmane Khouma,et al. New Steganographic scheme based of Reed- Solomon codes , 2012 .
[17] R. Morelos-Zaragoza. The art of error correcting coding , 2002 .
[18] Peter Hanzlik,et al. Steganography in Reed-Solomon Codes , 2011 .