A steganographic method using Bernoulli's chaotic maps
暂无分享,去创建一个
Leonardo Palacios-Luengas | Ruben Vázquez-Medina | José Alejandro Díaz-Méndez | Ricardo Francisco Martinez-Gonzalez | Juan López-Hernández | J. A. Díaz-Méndez | J. López-Hernández | R. Vázquez-Medina | L. Palacios-Luengas | R. Martínez-González
[1] A. A. Zaidan,et al. New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .
[2] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[3] Melad J. Saeed,et al. A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE , 2013 .
[4] Bhanu Kapoor,et al. State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher , 2014 .
[5] Jacob D. Frank. One Dimensional Chaotic Dynamical Systems , 2005 .
[6] Sirma Yavuz,et al. Security problems for a pseudorandom sequence generator based on the Chen chaotic system , 2013, Comput. Phys. Commun..
[7] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[8] Jessica J. Fridrich,et al. Steganography using Gibbs random fields , 2010, MM&Sec '10.
[9] Neha Aggarwal,et al. Enhanced Least Significant Bit algorithm For Image Steganography , 2012 .
[10] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[11] KokSheik Wong,et al. Data embedding in random domain , 2015, Signal Process..
[12] Iqtadar Hussain,et al. A technique for digital steganography using chaotic maps , 2014 .
[13] Kousik Dasgupta,et al. A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain , 2014 .
[14] R. Povinelli,et al. Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .
[15] George M. Joseph. High Security Cryptographic Technique Using Steganography and Chaotic Image Encryption , 2013 .
[16] C. P. Sumathi,et al. A Study of Various Steganographic Techniques Used for Information Hiding , 2014, ArXiv.
[17] Manjot Bhatia,et al. An Image Steganography Method Using Spread Spectrum Technique , 2014, SocProS.
[18] Sakshi Pratap,et al. Image Encryption and Steganography Using Chaotic Maps with a Double Key Protection , 2014, SocProS.
[19] Christian Cachin,et al. An information-theoretic model for steganography , 1998, Inf. Comput..
[20] S. Hemalatha,et al. A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.