Compression Technique Using DCT & Fractal Compression: A Survey
暂无分享,去创建一个
[1] 김인택. [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .
[2] Chin-Chen Chang,et al. A DCT-domain system for hiding fractal compressed images , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[3] K. Munivara Prasad,et al. High Secure Image Steganography in BCBS Using DCT and Fractal Compression , 2010 .
[4] André Kaup,et al. Steganographic system based on higher-order statistics , 2003, IS&T/SPIE Electronic Imaging.
[5] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[6] Y. Fisher. Fractal image compression: theory and application , 1995 .
[7] Niels Provos,et al. Defending Against Statistical Steganalysis , 2001, USENIX Security Symposium.
[8] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[9] Chaur-Chin Chen. On the selection of image compression algorithms , 1998, Proceedings. Fourteenth International Conference on Pattern Recognition (Cat. No.98EX170).
[10] Wesley E. Snyder,et al. Blind consistency-based steganography for information hiding in digital media , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[11] Lisa M. Marvel,et al. Spread spectrum image steganography , 1999, IEEE Trans. Image Process..
[12] Sachin Dhawan,et al. A Review of Image Compression and Comparison of its Algorithms , 2011 .
[13] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[14] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998 .
[16] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[17] Siwei Lyu,et al. Steganalysis using higher-order image statistics , 2006, IEEE Transactions on Information Forensics and Security.
[18] Ross J. Anderson,et al. On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..