Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques
暂无分享,去创建一个
[1] E. Stanley Lee,et al. An extension of TOPSIS for group decision making , 2007, Math. Comput. Model..
[2] Stelios H. Zanakis,et al. Multi-attribute decision making: A simulation comparison of select methods , 1998, Eur. J. Oper. Res..
[3] B. B. Zaidan,et al. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.
[4] A. A. Zaidan,et al. A methodology for football players selection problem based on multi-measurements criteria analysis , 2017 .
[5] S. Abdul Kather,et al. Real Steganography in Non Voice Part of the Speech , 2012 .
[6] B. B. Zaidan,et al. Towards on Develop a Framework for the Evaluation and Benchmarking of Skin Detectors Based on Artificial Intelligent Models Using Multi-Criteria Decision-Making Techniques , 2017, Int. J. Pattern Recognit. Artif. Intell..
[7] B. B. Zaidan,et al. New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.
[8] Dubravka M. Pavlicic,et al. Normalisation affects the results of MADM methods , 2001 .
[9] Zarinah Mohd Kasirun,et al. On the capacity and security of steganography approaches: An overview , 2010 .
[10] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[11] Ghazali Sulong,et al. A new fuzzy performance modeling for evaluating the trade-off among robustness, quality and capacity in watermaking algorithms , 2012 .
[12] A. A. Zaidan,et al. A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .
[13] Morteza Yazdani,et al. A state-of the-art survey of TOPSIS applications , 2012, Expert Syst. Appl..
[14] B. Zaidan,et al. New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .
[15] B. B. Zaidan,et al. Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..
[16] Sherin M. Youssef,et al. Adaptive video watermarking integrating a fuzzy wavelet-based human visual system perceptual model , 2013, Multimedia Tools and Applications.
[17] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .
[18] Hamid A. Jalab,et al. An Overview on Hiding Information Technique in Images , 2010 .
[19] A. A. Zaidan,et al. A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .
[20] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[21] A. A. Zaidan,et al. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .
[22] Ahmed Wathik Naji,et al. Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography , 2009 .
[23] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[24] Binh Pham,et al. Semi fragile watermark with self authentication and self recovery , 2009 .
[25] Jeng-Shyang Pan,et al. Tabu search based multi-watermarks embedding algorithm with multiple description coding , 2011, Inf. Sci..
[26] Jiwu Huang,et al. Twenty years of digital audio watermarking - a comprehensive review , 2016, Signal Process..
[27] Asifullah Khan,et al. Genetic perceptual shaping: Utilizing cover image and conceivable attack information during watermark embedding , 2007, Inf. Fusion.
[28] B. B. Zaidan,et al. Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.
[29] Ching-Lai Hwang,et al. Fuzzy Multiple Attribute Decision Making - Methods and Applications , 1992, Lecture Notes in Economics and Mathematical Systems.
[30] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[31] Abdullah Gani. Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .
[32] Ali Hamzeh,et al. A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.
[33] A. A. Zaidan,et al. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .
[34] B. B. Zaidan,et al. Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..
[35] Francesco G. B. De Natale,et al. Watermarking Robustness Evaluation Based on Perceptual Quality via Genetic Algorithms , 2009, IEEE Transactions on Information Forensics and Security.
[36] Bilal Zaidan,et al. Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.
[37] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[38] Zarinah Mohd Kasirun,et al. On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .
[39] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[40] A. A. Zaidan,et al. Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions , 2018 .
[41] A. A. Zaidan,et al. StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .
[42] Hong Peng,et al. An optimal image watermarking approach based on a multi-objective genetic algorithm , 2011, Inf. Sci..
[43] B. B. Zaidan,et al. Overview: Main Fundamentals for Steganography , 2010, ArXiv.
[44] A. A. Zaidan,et al. A review of audio based steganography and digital watermarking , 2011 .
[45] Ja-Ling Wu,et al. Fidelity-guaranteed robustness enhancement of blind-detection watermarking schemes , 2009, Inf. Sci..
[46] A. A. Zaidan,et al. New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .
[47] Fazida Othman,et al. Stego-Image vs Stego-Analysis System , 2009 .
[48] B. B. Zaidan,et al. Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..
[49] Malay Kumar Kundu,et al. Genetic algorithms for optimality of data hiding in digital images , 2008, Soft Comput..
[50] A. A. Zaidan,et al. Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .
[51] Gwo-Hshiung Tzeng,et al. Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS , 2004, Eur. J. Oper. Res..
[52] A. A. Zaidan,et al. New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .
[53] A. A. Zaidan,et al. High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .
[54] T. Madhloom,et al. Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .
[55] Dimitris E. Koulouriotis,et al. Performance evaluation of moment-based watermarking methods: A review , 2012, J. Syst. Softw..
[56] Ee-Leng Tan,et al. Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform , 2015, Signal Process..
[57] Fazidah Othman,et al. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .
[58] Aydin Çelen,et al. Comparative Analysis of Normalization Procedures in TOPSIS Method: With an Application to Turkish Deposit Banking Market , 2014, Informatica.
[59] Mangal V. Pati,et al. Audio Watermarking: A Way to Copyright Protection , 2012 .