FFT-ETM based distortion less and high payload image steganography
暂无分享,去创建一个
[1] Kazutake Uehira,et al. A New Displaying Technology for Information Hiding Using Temporally Brightness Modulated Pattern , 2017 .
[2] G. Charith K. Abhayaratne,et al. Visual Attention-Based Image Watermarking , 2016, IEEE Access.
[3] Fei Peng,et al. A Low-Distortion Reversible Watermarking for 2D Engineering Graphics Based on Region Nesting , 2018, IEEE Transactions on Information Forensics and Security.
[4] Xiaoming Xi,et al. Robust Image Fingerprinting Based on Feature Point Relationship Mining , 2018, IEEE Transactions on Information Forensics and Security.
[5] Krishna Mohan Buddhiraju,et al. Secure Dissemination and Protection of Multispectral Images Using Crypto-Watermarking , 2015, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[6] Ahmed Khan,et al. Practical Guidelines for Securing Wireless Local Area Networks (WLANs) , 2018 .
[7] Javaid A. Sheikh,et al. Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption , 2018, IEEE Access.
[8] H. P. Meana,et al. Watermarking-based Color Image Authentication with Detection and Recovery Capability , 2016, IEEE Latin America Transactions.
[9] Safya Belghith,et al. A new adaptive image steganography scheme based on DCT and chaotic map , 2017, Multimedia Tools and Applications.
[10] Jau-Ji Shen,et al. Features Classification Forest: A Novel Development that is Adaptable to Robust Blind Watermarking Techniques , 2017, IEEE Transactions on Image Processing.
[11] Hamid Reza Shahdoosti,et al. Transform-based watermarking algorithm maintaining perceptual transparency , 2017, IET Image Process..
[12] Anirban Bose,et al. Spread Spectrum Watermark Detection on Degraded Compressed Sensing , 2017, IEEE Sensors Letters.
[13] Xinpeng Zhang,et al. Distortion function based on residual blocks for JPEG steganography , 2017, Multimedia Tools and Applications.
[14] Karim Faez,et al. An image steganography method based on integer wavelet transform , 2017, Multimedia Tools and Applications.
[15] Zongmin Cui,et al. Blind Reversible Authentication Based on PEE and CS Reconstruction , 2018, IEEE Signal Processing Letters.
[16] Zahid Mehmood,et al. Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption , 2019, Soft Comput..
[17] Damon M. Chandler,et al. Digital Image Watermarking via Adaptive Logo Texturization , 2015, IEEE Transactions on Image Processing.
[18] Chia-Chen Lin,et al. Blind Dual Watermarking for Color Images’ Authentication and Copyright Protection , 2018, IEEE Transactions on Circuits and Systems for Video Technology.
[19] Yun-Qing Shi,et al. Separable Reversible Data Hiding for Encrypted Palette Images With Color Partitioning and Flipping Verification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.
[20] Mohsen A. M. El-Bendary,et al. FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks , 2017, Multimedia Tools and Applications.
[21] Gheith A. Abandah,et al. Crypto-based algorithms for secured medical image transmission , 2015, IET Inf. Secur..
[22] Houbing Song,et al. Digital image watermarking method based on DCT and fractal encoding , 2017, IET Image Process..
[23] Asifullah Khan,et al. High capacity reversible image watermarking using error expansion and context-dependent embedding , 2015 .
[24] Xiaochun Cao,et al. Fake Colorized Image Detection , 2018, IEEE Transactions on Information Forensics and Security.
[25] WADOOD ABDUL,et al. Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.
[26] Weiming Zhang,et al. Which gray level should be given the smallest cost for adaptive steganography? , 2017, Multimedia Tools and Applications.
[27] D. N. Vizireanu,et al. Watermarking-based image authentication robust to JPEG compression , 2015 .
[28] Ahmed Khan,et al. Feature Selection Based Correlation Attack on HTTPS Secure Searching , 2018, Wirel. Pers. Commun..
[29] Jordi Cabot,et al. On Watermarking for Collaborative Model-Driven Engineering , 2018, IEEE Access.
[30] Anand Singh Jalal,et al. LSB based non blind predictive edge adaptive image steganography , 2017, Multimedia Tools and Applications.
[31] Textual Steganography,et al. HIGH-CAPACITY MULTI-LAYER FRAMEWORK FOR HIGHLY ROBUST , 2016 .
[32] Jing Liu,et al. 3D model watermarking algorithm robust to geometric attacks , 2017, IET Image Process..
[33] P. Vijay Bhaskar Reddy,et al. Privacy-preserving Image Processing in the Cloud , 2019 .
[34] Guopu Zhu,et al. Transportation Spherical Watermarking , 2018, IEEE Transactions on Image Processing.
[35] Ahmed Khan,et al. Novel high-capacity robust and imperceptible image steganography scheme using multi-flipped permutations and frequency entropy matching method , 2019, Soft Comput..
[36] Ahmed Khan,et al. High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device , 2019, Wirel. Pers. Commun..
[37] Isha Mehra,et al. Gyrator wavelet transform , 2018, IET Image Process..
[38] Héctor M. Pérez Meana,et al. Improved imperceptible visible watermarking algorithm for auxiliary information delivery , 2018, IET Biom..
[39] Zhaofeng Ma,et al. Digital rights management: Model, technology and application , 2017, China Communications.
[40] Na Zhang,et al. Digital watermarking algorithm based on scale-invariant feature regions in non-subsampled contourlet transform domain , 2015 .
[41] Ahmed Khan. Robust Textual Steganography , 2015 .
[42] Aliazam Abbasfar,et al. A Watermarking Method for Digital Speech Self-Recovery , 2015, IEEE/ACM Transactions on Audio, Speech, and Language Processing.
[43] Kazutake Uehira,et al. Display technique for embedding information in real object images using temporally and spatially luminance-modulated light , 2016, 2016 IEEE Industry Applications Society Annual Meeting.
[44] Ahmed Khan. Joint Ownership Verification for Digital Text , 2015, CSA 2015.
[45] Karen A. Scarfone,et al. Vetting the Security of Mobile Applications , 2015 .
[46] Song Guo,et al. Robust Histogram Shape-Based Method for Image Watermarking , 2015, IEEE Transactions on Circuits and Systems for Video Technology.