Enhancing LSB embedding schemes using chaotic maps systems
暂无分享,去创建一个
Abdallah Meraoumia | Hakim Bendjenna | Laimeche Lakhdar | A. Meraoumia | H. Bendjenna | Laimeche Lakhdar
[1] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[2] David L. Neuhoff,et al. Structural Texture Similarity Metrics for Image Analysis and Retrieval , 2013, IEEE Transactions on Image Processing.
[3] Andrew D. Ker. A General Framework for Structural Steganalysis of LSB Replacement , 2005, Information Hiding.
[4] Shumeet Baluja,et al. Hiding Images in Plain Sight: Deep Steganography , 2017, NIPS.
[5] Odai M.Al-Shatanawi,et al. A New Image Steganography Algorithm Based on MLSB Method with Random Pixels Selection , 2015 .
[6] Li Wenbo,et al. A chaos-based robust wavelet-domain watermarking algorithm , 2004 .
[7] Zhen Liu,et al. Image Information Hiding Encryption Using Chaotic Sequence , 2007, KES.
[8] Srikanta Patnaik,et al. Can a chaos system provide secure communication over insecure networks?—Online automatic teller machine services as a case study , 2018, J. Electronic Imaging.
[9] Shifei Ding,et al. Research on Point-wise Gated Deep Networks , 2017, Appl. Soft Comput..
[10] Gandharba Swain,et al. Digital Image Steganography based on Seven Way Pixel Value Differencing , 2016 .
[11] Nan Zhang,et al. Unsupervised and semi-supervised extreme learning machine with wavelet kernel for high dimensional data , 2016, Memetic Computing.
[12] Mohan S. Kankanhalli,et al. Currency security and forensics: a survey , 2015, Multimedia Tools and Applications.
[13] Rinaldi Munir,et al. Secure Spread Spectrum Watermarking Algorithm Based on Chaotic Map for Still Images , 2007 .
[14] C. Vasantha Lakshmi,et al. Robust Adaptive Watermarking Based on Image Contents Using Wavelet Technique , 2015 .
[15] Jing Dong,et al. SSGAN: Secure Steganography Based on Generative Adversarial Networks , 2017, PCM.
[16] Azizah Abdul Manaf,et al. Collusion-Resistant digital video watermarking for copyright protection application , 2016 .
[17] Partha Pratim Ray. Towards an Internet of Things based architectural framework for defence , 2015, 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[18] John H. Holland,et al. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .
[19] Tieyong Zeng,et al. A Generalization of LSB Matching , 2009, IEEE Signal Processing Letters.
[20] Zhengjun Zhai,et al. A New Image Encryption Algorithm Based on Multiple Chaos System , 2008, ISECS 2008.
[21] Frank Y. Shih,et al. Genetic algorithm based methodology for breaking the steganalytic systems , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[22] Rainer Böhme,et al. Revisiting weighted stego-image steganalysis , 2008, Electronic Imaging.
[23] Chin-Chen Chang,et al. New image steganographic methods using run-length approach , 2006, Inf. Sci..
[24] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[25] Chien-Ping Chang,et al. High-payload image hiding with quality recovery using tri-way pixel-value differencing , 2012, Inf. Sci..
[26] Jiwu Huang,et al. Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.
[27] Xin-She Yang,et al. A New Metaheuristic Bat-Inspired Algorithm , 2010, NICSO.
[28] Shifei Ding,et al. An overview on Restricted Boltzmann Machines , 2018, Neurocomputing.
[29] Jessica J. Fridrich,et al. On Steganographic Embedding Efficiency , 2006, Information Hiding.
[30] Muhammad N. Marsono,et al. Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..
[31] Xinpeng Zhang,et al. Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security , 2004, Pattern Recognit. Lett..
[32] Petr Dzurenda,et al. On Feasibility of Post-Quantum Cryptography on Small Devices , 2018 .
[33] Wen Gao,et al. A variable depth LSB data hiding technique in images , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[34] Denis Volkhonskiy,et al. Generative Adversarial Networks for Image Steganography , 2017 .
[35] Cheng-Hsing Yang,et al. Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems , 2008, IEEE Transactions on Information Forensics and Security.
[36] Konstantinos N. Plataniotis,et al. Towards a Full-Reference Quality Assessment for Color Images Using Directional Statistics , 2015, IEEE Transactions on Image Processing.
[37] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[38] Rainer Böhme,et al. The security cost of cheap user interaction , 2011, NSPW '11.
[39] Kwok-Wo Wong,et al. An efficient chaotic image encryption algorithm based on a generalized Arnold map , 2012, Nonlinear Dynamics.