Steganographic Techniques of Data Hiding Using Digital Images (Review Paper)
暂无分享,去创建一个
[1] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[2] Aman Jantan,et al. A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion , 2008 .
[3] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[4] Farhad Keissarian. Hiding secrete data in compressed images using histogram analysis , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[5] Vojtech Holub,et al. On dangers of overtraining steganography to incomplete cover model , 2011, MM&Sec '11.
[6] Chin-Chen Chang,et al. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..
[7] Chin-Chen Chang,et al. An improvement of EMD embedding method for large payloads by pixel segmentation strategy , 2008, Image Vis. Comput..
[8] H. B. Kekre,et al. High payload using mixed codebooks of Vector Quantization , 2010 .
[9] Sukumar Nandi,et al. Online Voting System Powered by Biometric Security Using Steganography , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.
[10] N.A. Ismail,et al. Secure perceptual data hiding technique using information theory , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..
[11] Ki-Hyun Jung,et al. Improved Exploiting Modification Direction Method by Modulus Operation , 2009 .
[12] Donald E. Grierson,et al. Comparison among five evolutionary-based optimization algorithms , 2005, Adv. Eng. Informatics.
[13] Adi Shamir,et al. How to share a secret , 1979, CACM.
[14] Eiji Kawaguchi,et al. Principles and applications of BPCS steganography , 1999, Other Conferences.
[15] Cheng-Hsing Yang,et al. Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images , 2009, IAS.
[16] Che-Wei Lee,et al. A new steganographic method based on information sharing via PNG images , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[17] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[18] Chin-Chen Chang,et al. Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation , 2006, IEEE Transactions on Information Forensics and Security.
[19] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[20] Wei Sun,et al. Data Hiding in Block Truncation Coding , 2010, 2010 International Conference on Computational Intelligence and Security.
[21] M. Kiamini,et al. A high_performance steganographic method using JPEG and PSO algorithm , 2008, 2008 IEEE International Multitopic Conference.
[22] J. Mielikainen. LSB matching revisited , 2006, IEEE Signal Processing Letters.
[23] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[24] Honge Ren,et al. Reversible image hiding algorithm based on pixels difference , 2009, 2009 IEEE International Conference on Automation and Logistics.
[25] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[26] Chin-Chen Chang,et al. Lossless recovery of a VQ index table with embedded secret data , 2007, J. Vis. Commun. Image Represent..
[27] Ching-Yun Chang,et al. An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited , 2009, ICUIMC '09.
[28] Dana S. Richards,et al. Modified Matrix Encoding Technique for Minimal Distortion Steganography , 2006, Information Hiding.
[29] Farhad Keissarian. Using a Novel Variable Block Size Image Compression Algorithm for Hiding Secret Data , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[30] Wang Jiazhen,et al. An Authentication Scheme for VQ-Compressed Images , 2009, 2009 First International Workshop on Education Technology and Computer Science.
[31] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[32] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[33] Hassan Aghaeinia,et al. A More Secure Steganography Method in Spatial Domain , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.
[34] Andreas Westfeld,et al. F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .
[35] U. C. Niranjan,et al. Watermarking medical images with patient information , 1998, Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society. Vol.20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286).
[36] Gregory A. Kabatiansky,et al. Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[37] Chin-Chen Chang,et al. A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[38] Hyoung Joong Kim,et al. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding , 2009, MM&Sec '09.
[39] Jessica J. Fridrich,et al. Calibration revisited , 2009, MM&Sec '09.
[40] Tomás Pevný,et al. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.
[41] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[42] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[43] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[44] Cheng-Hsing Yang,et al. Reversible data hiding of a VQ index table based on referred counts , 2009, J. Vis. Commun. Image Represent..
[45] Jiangqun Ni,et al. An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[46] S.T. Maya,et al. Robust steganography using bit plane complexity segmentation , 2004, (ICEEE). 1st International Conference on Electrical and Electronics Engineering, 2004..
[47] Taejeong Kim,et al. Side match and overlap match vector quantizers for images , 1992, IEEE Trans. Image Process..
[48] Madhumita Sengupta,et al. Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF) , 2011, 2011 Second International Conference on Emerging Applications of Information Technology.
[49] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..