An Efficient Hybrid Steganography Method Based on Edge Adaptive and Tree Based Parity Check
暂无分享,去创建一个
[1] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[2] Samarjit Kar,et al. Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015 , 2013 .
[3] Oscar C. Au,et al. Data Hiding with Tree Based Parity Check , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[4] Aakanksha Pandey,et al. Steganography and Its Technique: Technical Overview , 2013 .
[5] Wen-Guey Tzeng,et al. An Optimal Data Hiding Scheme With Tree-Based Parity Check , 2011, IEEE Transactions on Image Processing.
[6] Jessica J. Fridrich,et al. On estimation of secret message length in LSB steganography in spatial domain , 2004, IS&T/SPIE Electronic Imaging.
[7] Vyacheslav N. Yarmolik,et al. Cryptography and Steganography: teaching experience , 2005, Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems.
[8] Nabin Ghoshal,et al. Steganography Based Visual Cryptography (SBVC) , 2013 .
[9] Jiwu Huang,et al. A more secure steganography based on adaptive pixel-value differencing scheme , 2011, Multimedia Tools and Applications.
[10] R. M. Samant,et al. Data hiding in gray-scale images using pixel value differencing , 2011, ICWET.
[11] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[12] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[13] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[14] Weiwei Liu,et al. Adaptive steganography based on block complexity and matrix embedding , 2013, Multimedia Systems.
[15] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[16] Jessica J. Fridrich,et al. Steganalysis of LSB Replacement Using Parity-Aware Features , 2012, Information Hiding.
[17] N. Verma,et al. Review of steganography techniques , 2011, ICWET.
[18] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Transactions on Information Forensics and Security.