Image steganography using redundant discrete wavelet transform and QR factorization
暂无分享,去创建一个
[1] Amir-Masoud Eftekhari-Moghadam,et al. An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method , 2015, Appl. Soft Comput..
[2] Siwei Lyu,et al. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines , 2002, Information Hiding.
[3] S. K. Sudheer,et al. Performance and analysis of high capacity Steganography of color images involving Wavelet Transform , 2015 .
[4] Bee Ee Khoo,et al. A new robust lossless data hiding scheme and its application to color medical images , 2015, Digit. Signal Process..
[5] Hedieh Sajedi,et al. Using contourlet transform and cover selection for secure steganography , 2010, International Journal of Information Security.
[6] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[7] Moyan Xiao,et al. High capacity image steganography method based on framelet and compressive sensing , 2015, International Symposium on Multispectral Image Processing and Pattern Recognition.
[8] Andrew P. Bradley. Shift-invariance in the Discrete Wavelet Transform , 2003, DICTA.
[9] Lingling Wu,et al. Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm , 2009, 2009 First International Conference on Information Science and Engineering.
[10] Robert M. Haralick,et al. Textural Features for Image Classification , 1973, IEEE Trans. Syst. Man Cybern..
[11] Bin Li,et al. A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..
[12] Jing-Ming Guo,et al. Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition , 2014 .
[13] Nasir D. Memon,et al. Cover Selection for Steganographic Embedding , 2006, 2006 International Conference on Image Processing.
[14] Mohamed-Jalal Fadili,et al. The Undecimated Wavelet Decomposition and its Reconstruction , 2007, IEEE Transactions on Image Processing.
[15] Mansi S. Subhedar,et al. High Capacity Image Steganography based on Discrete Wavelet Transform and Singular Value Decomposition , 2014, ICTCS '14.
[16] Gang Wang,et al. Color image blind watermarking scheme based on QR decomposition , 2014, Signal Process..
[17] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[18] Yongsheng Zhao,et al. A blind double color image watermarking algorithm based on QR decomposition , 2013, Multimedia Tools and Applications.
[19] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[20] Hedieh Sajedi,et al. CBS: Contourlet-Based Steganalysis Method , 2010, J. Signal Process. Syst..
[21] Chang-Jun Ahn,et al. Parallel detection algorithm using multiple QR decompositions with permuted channel matrix for SDM/OFDM , 2008, 2008 3rd International Symposium on Wireless Pervasive Computing.
[22] Gerald Schaefer,et al. UCID: an uncompressed color image database , 2003, IS&T/SPIE Electronic Imaging.
[23] J. E. Fowler,et al. The redundant discrete wavelet transform and additive noise , 2005, IEEE Signal Processing Letters.