IRIS BIOMETRICS STEGANOGRAPHIC METHOD WITH PIXELVALUE DIFFERENCING AND HOUGH TRANSFORMFOR HIGHER SECURITY SYSTEM
暂无分享,去创建一个
[1] Cheng-Hsing Yang,et al. Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy , 2007 .
[2] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[3] Ahmed S. Salama,et al. Wavelet-pixel value differencing technique for digital images data hiding , 2011, 2011 IEEE International Conference on System Engineering and Technology.
[4] Heung-Kyu Lee,et al. STEGANALYSIS METHOD DEFEATING THE MODIFIED PIXEL-VALUE DIFFERENCING STEGANOGRAPHY , 2010 .
[5] Jiwu Huang,et al. A more secure steganography based on adaptive pixel-value differencing scheme , 2011, Multimedia Tools and Applications.
[6] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[7] M. Hwang,et al. Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .
[8] Ali Hamzeh,et al. A novel steganalysis for TPVD steganographic method based on differences of pixel difference histogram , 2010, Multimedia Tools and Applications.
[9] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[10] R. Akila,et al. A Comparative Analysis of Image Steganography , 2010 .
[11] Joseph P. Noonan,et al. Image Steganography Scheme using Chaos and Fractals with the Wavelet Transform , .
[12] Ja-Chen Lin,et al. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..
[13] M. Padmaa,et al. ZIG-ZAG PVD - A Nontraditional Approach , 2010 .
[14] S.Maruthu Perumal,et al. Sorted Pixel Value Difference on Fuzzy Watermarking Scheme , 2012 .
[15] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[16] Ja-Chen Lin,et al. Hiding data in images by optimal moderately-significant-bit replacement , 2000 .
[17] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.