High Capacity and Statistical Attacks Resistant Reversible Image Data Hiding Scheme using LSB Substitution
暂无分享,去创建一个
[1] H. B. Kekre,et al. Performance evaluation of pixel value differencing and Kekre's modified algorithm for information hiding in images , 2009, ICAC3 '09.
[2] Gary C. Kessler,et al. An Overview of Steganography for the Computer Forensics Examiner , 2004 .
[3] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[4] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[5] Xinpeng Zhang,et al. Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..
[6] Niels Provos,et al. Detecting Steganographic Content on the Internet , 2002, NDSS.
[7] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[8] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator High Capacity Technique for RGB Image Based Steganography , 2008 .
[9] D. Artz,et al. Digital steganography: hiding data within data , 2001 .
[10] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[11] Mehdi Hussain,et al. Pixel intensity based high capacity data embedding method , 2010, 2010 International Conference on Information and Emerging Technologies.
[12] Alisha Arora,et al. IMAGE STEGANOGRAPHY TECHNIQUES: AN OVERVIEW , 2014 .
[13] Jessica J. Fridrich,et al. Lossless Data Embedding—New Paradigm in Digital Watermarking , 2002, EURASIP J. Adv. Signal Process..
[14] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.
[15] N. Hamid,et al. Image Steganography Techniques : An Overview , 2012 .
[16] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[17] Heung-Kyu Lee,et al. Multi Bit Plane Image Steganography , 2006, IWDW.
[18] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[19] Kathryn Hempstalk,et al. Hiding Behind Corners : Using Edges in Images for Better Steganography , 2006 .