BIT LENGTH REPLACEMENT STEGANOGRAPHY BASED ON DCT COEFFICIENTS
暂无分享,去创建一个
K. B. Raja | R. K. Chhotaray | Sabyasachi Pattanaik | K B Shiva Kumar | K. Raja | R. Chhotaray | K. Kumar | S. Pattanaik
[1] Dusan Levicky,et al. Steganography systems by using CDMA techniques , 2009, 2009 19th International Conference Radioelektronika.
[2] Mahdi Ramezani,et al. Adaptive Image Steganography with Mod-4 Embedding Using Image Contrast , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[3] Yixian Yang,et al. Analysis of Current Steganography Tools: Classifications & Features , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[4] Kevin Curran,et al. Enhancing Steganography in Digital Images , 2008, 2008 Canadian Conference on Computer and Robot Vision.
[5] Tung-Shou Chen,et al. Lossless Steganography for AMBTC-Compressed Images , 2008, 2008 Congress on Image and Signal Processing.
[6] Mee Young Sung,et al. Steganography using block-based adaptive threshold , 2007, 2007 22nd international symposium on computer and information sciences.
[7] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[8] Min-Shiang Hwang,et al. Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..
[9] Hongmei Tang,et al. A New Image Encryption and Steganography Scheme , 2009, 2009 International Conference on Computer and Communications Security.
[10] B. B. Zaidan,et al. Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[11] Saleh Zein-Sabatto,et al. Learning to grasp in unknown environment by reinforcement learning and shaping , 2006, 2006 IEEE International Conference on Systems, Man and Cybernetics.
[12] Daniela Stanescu,et al. Steganography on embedded devices , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.
[13] V. Vijayalakshmi,et al. A modulo based LSB steganography method , 2009, 2009 International Conference on Control, Automation, Communication and Energy Conservation.
[14] A. Touir,et al. A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[15] Josef Pieprzyk,et al. Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography , 2010, 2010 International Conference on Availability, Reliability and Security.
[16] A. A. Zaidan,et al. "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[17] Mohammad Hassan Shirali-Shahreza,et al. A New Synonym Text Steganography , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Xijian Ping,et al. Estimation of MB steganography based on least square method , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.
[19] Po-Yueh Chen,et al. A DWT Based Approach for Image Steganography , 2006 .
[20] Sos S. Agaian,et al. Generalized collage steganography on images , 2008, 2008 IEEE International Conference on Systems, Man and Cybernetics.
[21] Marios Savvides,et al. Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[22] Long-Wen Chang,et al. Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform , 2006, PSIVT.
[23] K.B. Raja,et al. A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.
[24] Vijay Kumar,et al. Performance evaluation of DWT based image steganography , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[25] H. H. Zayed,et al. An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.
[26] D. Lakshmi Narayana,et al. High Capacity Image Steganography in Wavelet Domain , 2022 .