An Analysis of 3D Steganography Techniques
暂无分享,去创建一个
Mazdak Zamani | Azizah Abdul Manaf | Rohit Tanwar | Urmila Pilania | Rohit Tanwar | M. Zamani | A. Manaf | Urmila Pilania
[1] Roshidi Din,et al. Analysis review on spatial and transform domain technique in digital steganography , 2020, Bulletin of Electrical Engineering and Informatics.
[2] Mohsen Moradi,et al. Combining and Steganography of 3D Face Textures , 2017, ArXiv.
[3] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[4] Juan Lin,et al. 3D Multilayered Turtle Shell Models for Image Steganography , 2020 .
[5] Rafiqul Islam,et al. An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures , 2016, Inf. Secur. J. A Glob. Perspect..
[6] William Puech,et al. Lossless 3D steganography based on MST and connectivity modification , 2010, Signal Process. Image Commun..
[7] Chin-Chen Chang,et al. An Image Steganography Scheme Using 3D-Sudoku , 2016, J. Inf. Hiding Multim. Signal Process..
[8] Nasir D. Memon,et al. Steganalysis using image quality metrics , 2003, IEEE Trans. Image Process..
[9] Akram M. Zeki,et al. A Genetic-Algorithm-Based Approach for Audio Steganography , 2009 .
[10] M. Dupac,et al. 3D Steganography Models , 2008 .
[11] Peyman Ayubi,et al. High secure digital image steganography based on 3D chaotic map , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).
[12] Nannan Li,et al. A High-Capacity 3D Steganography Algorithm With Adjustable Distortion , 2017, IEEE Access.
[13] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[14] Adrian G. Bors,et al. Steganalysis of 3D objects using statistics of local feature sets , 2017, Inf. Sci..
[15] Yuan-Yu Tsai. An adaptive steganographic algorithm for 3D polygonal models using vertex decimation , 2012, Multimedia Tools and Applications.
[16] Urmila Pilania,et al. A Proposed Optimized Steganography Technique using ROI, IWT and SVD , 2019 .
[17] Mazdak Zamani,et al. An overview on audio steganography techniques , 2012 .
[18] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[19] Wassim Alexan,et al. AES-Secured Bit-Cycling Steganography in Sliced 3D Images , 2020, 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE).
[20] Jean-Luc Dugelay,et al. Steganography in 3D Geometries and Images by Adjacent Bin Mapping , 2009, EURASIP J. Inf. Secur..
[21] R. Ramesh,et al. Critical review of image steganalysis techniques , 2015, Int. J. Adv. Intell. Paradigms.
[22] Mazdak Zamani,et al. Determining the threshold of pixel correlativity analysis , 2013 .
[23] Peyman Ayubi,et al. An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..
[24] Akram M. Zeki,et al. An artificial-intelligence-based approach for audio steganography , 2009 .
[25] Nasir D. Memon,et al. Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.
[26] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[27] Adrian G. Bors,et al. 3D mesh steganalysis using local shape features , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[28] Wen-Hsing Hsu,et al. A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation , 2010, IEEE Transactions on Information Forensics and Security.
[29] Mazdak Zamani,et al. VW16E: A Robust Video Watermarking Technique Using Simulated Blocks , 2017 .
[30] Subariah Ibrahim,et al. A New Method for Audio Steganography Using Message Integrity , 2013 .
[31] Ajaz Hussain Mir,et al. Classification of steganalysis techniques: A study , 2010, Digit. Signal Process..
[32] Mengtian Cui,et al. Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things , 2020, IEEE Access.
[33] Vijay Kumar,et al. Comprehensive survey of 3D image steganography techniques , 2018, IET Image Process..
[34] Hossein Rouhani Zeidanloo,et al. A Novel Approach for Genetic Audio Watermarking , 2010 .
[35] Hossein Rouhani Zeidanloo,et al. Genetic Audio Watermarking , 2010, BAIP.
[36] William Puech,et al. 3D Data Hiding for Enhancement and Indexation on Multimedia Medical Data , 2018, MIAD.
[37] Manisha Rana,et al. Genetic Algorithm in Audio Steganography , 2014, ArXiv.
[38] V. Prasanna Venkatesan,et al. Pattern based 3D image Steganography , 2013 .
[39] Nasir D. Memon,et al. Benchmarking steganographic and steganalysis techniques , 2005, IS&T/SPIE Electronic Imaging.
[40] George Papadourakis,et al. A review of image steganalysis techniques for digital forensics , 2018, J. Inf. Secur. Appl..
[41] Jau-Ji Shen,et al. Data Hiding Method Based on 3D Magic Cube , 2020, IEEE Access.
[42] Ying Yang,et al. Mesh Discriminative Features for 3D Steganalysis , 2014, TOMCCAP.
[43] Wassim Alexan,et al. A High Capacity Geometrical Domain Based 3D Image Steganography Scheme , 2019, 2019 International Conference on Advanced Communication Technologies and Networking (CommNet).
[44] Sherif M. Badr,et al. A Review on Steganalysis Techniques: From Image Format Point of View , 2014 .
[45] Ying Yang,et al. A 3D Steganalytic Algorithm and Steganalysis-Resistant Watermarking , 2017, IEEE Transactions on Visualization and Computer Graphics.
[46] Adrian G. Bors,et al. 3D Steganalysis Using the Extended Local Feature Set , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[47] Akram M. Zeki,et al. PSW statistical LSB image steganalysis , 2016, Multimedia Tools and Applications.
[48] Mazdak Zamani,et al. Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques , 2010 .
[49] Wassim Alexan,et al. A Comparative Study Among Different Mathematical Sequences in 3D Image Steganography , 2020 .
[50] Akram M. Zeki,et al. A robust watermark embedding in smooth areas , 2011 .
[51] Wassim Alexan,et al. Secure Message Embedding in 3D Images , 2019, 2019 International Conference on Innovative Trends in Computer Engineering (ITCE).
[52] Anjum Ara,et al. A Hybrid Approach Based 3d Image Steganography Instead of 2d Image for Exchange Information , 2018, 2018 3rd International Conference on Communication and Electronics Systems (ICCES).
[53] Chao-Hung Lin,et al. A High Capacity 3D Steganography Algorithm , 2009, IEEE Transactions on Visualization and Computer Graphics.
[54] P SarigaN,et al. Steganographic data hiding in automatic converted 3D image from 2D and 2D to 3D video conversion , 2015 .
[55] Mazdak Zamani,et al. Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.
[56] Siti Zaiton Mohd Hashim,et al. A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.
[57] Chung-Ming Wang,et al. A NOVEL HIGH CAPACITY 3D STEGANOGRAPHIC ALGORITHM , 2011 .
[58] Mazdak Zamani,et al. Correlation between PSNR and bit per sample rate in audio steganography , 2012 .
[59] Subhendu Kumar Pani,et al. SSII: Secured and High-Quality Steganography Using Intelligent Hybrid Optimization Algorithms for IoT , 2021, IEEE Access.
[60] Kejiang Chen,et al. Distortion Design for Secure Adaptive 3-D Mesh Steganography , 2019, IEEE Transactions on Multimedia.
[61] Kumud Sachdeva,et al. Review of Various Steganalysis Techniques , 2018 .
[62] Pachiyappan Arulmozhivarman,et al. High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.
[63] Touradj Ebrahimi,et al. Steganography for Three-Dimensional Polygonal Meshes , 2002, SPIE Optics + Photonics.
[64] Hossein Rouhani Zeidanloo,et al. Genetic substitution-based audio steganography for high capacity applications , 2011 .
[65] Wassim Alexan,et al. Secure 3D data hiding technique based on a mesh traversal algorithm , 2020, Multimedia Tools and Applications.
[66] Mazdak Zamani,et al. A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains , 2015 .