Graphical Data Steganographic Protection Method Based on Bits Correspondence Scheme
暂无分享,去创建一个
Zhengbing Hu | Yevgeniya Sulema | Ivan Dychka | Yevhen Radchenko | I. Dychka | Y. Sulema | Zhengbing Hu | Y. Radchenko
[1] Jan H. P. Eloff,et al. An overview of image steganography , 2005, ISSA.
[2] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[3] M.-R. Akbarzadeh-T,et al. A New Genetic Algorithm Approach for Secure JPEG Steganography , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.
[4] Bernd Girod,et al. Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.
[5] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[6] Gautam Sanyal,et al. A Survey of Steganography and Steganalysis Technique in Image, Text, Audio and Video as Cover Carrier , 2011 .
[7] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[8] Danny Pascale,et al. A Review of RGB Color Spaces , 2003 .
[9] P. K. Mishra,et al. Understanding Color Models: A Review , 2012 .
[10] H. Y. Kim,et al. Toward a secure public-key blockwise fragile authentication watermarking , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[11] Samir Kumar Bandyopadhyay,et al. An Application of Palette Based Steganography , 2010 .
[12] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[13] Holger Kummert,et al. The PPP Triple-DES Encryption Protocol (3DESE) , 1998, RFC.
[14] Yevgeniya Sulema. Image protection method based on binary operations , 2016, 2016 International Conference on Systems, Signals and Image Processing (IWSSIP).
[15] Pierre Duhamel,et al. Applied public-key steganography , 2002, IS&T/SPIE Electronic Imaging.