Eigenfaces-Based Steganography
暂无分享,去创建一个
[1] S. K. Srivatsa,et al. Video Steganography for Face Recognition with Signcryption for Trusted and Secured Authentication by using PCASA , 2012 .
[2] Tarun Mirani,et al. Face Detection and Steganography Algorithms for Passport Issuing System , 2014 .
[3] Craig Valli,et al. Integration of Biometrics and Steganography: A Comprehensive Review , 2019, Technologies.
[4] Muzafer Saračević,et al. A Novel Approach to Data Encryption Based on Matrix Computations , 2021 .
[5] N. Hamid,et al. Image Steganography Techniques : An Overview , 2012 .
[6] Zhilin Li,et al. Effects of JPEG compression on image classification , 2003 .
[7] Clifford Bergman,et al. Unitary embedding for data hiding with the SVD , 2005, IS&T/SPIE Electronic Imaging.
[8] Chin-Chen Chang,et al. AN SVD ORIENTED WATERMARK EMBEDDING SCHEME WITH HIGH QUALITIES FOR THE RESTORED IMAGES , 2007 .
[9] Rejani. Comparative Study of Spatial Domain Image Steganography Techniques , 2015 .
[10] Madhuri S. Joshi,et al. A High Capacity Secured Image Steganography Method with Five Pixel Pair Differencing and LSB Substitution , 2015 .
[11] K. M. Singh,et al. A Robust Steganographic Method based on Singular Value Decomposition , 2006 .
[12] Seifedine Kadry,et al. New Generating Technique for Image Steganography , 2013 .
[13] Prithwish Das,et al. A New Image Steganography Method using Message Bits Shuffling , 2018, JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES.
[14] T. Sørensen,et al. A method of establishing group of equal amplitude in plant sociobiology based on similarity of species content and its application to analyses of the vegetation on Danish commons , 1948 .
[15] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[16] Stefanos Zafeiriou,et al. 300 Faces In-The-Wild Challenge: database and results , 2016, Image Vis. Comput..
[17] Xiaogang Wang,et al. Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).
[18] Mehmet Demirci,et al. StegoGIS: A new steganography method using the geospatial domain , 2019 .
[19] Muzafer Saračević,et al. A novel approach to steganography based on the properties of Catalan numbers and Dyck words , 2019, Future Gener. Comput. Syst..
[20] Kuo-Liang Chung,et al. On SVD-based watermarking algorithm , 2007, Appl. Math. Comput..
[21] Nicholas Ayache,et al. Geometric Means in a Novel Vector Space Structure on Symmetric Positive-Definite Matrices , 2007, SIAM J. Matrix Anal. Appl..
[22] Debajyoti Mukhopadhyay,et al. Levenshtein Distance Technique in Dictionary Lookup Methods: An Improved Approach , 2011, ArXiv.
[23] Marghny H. Mohamed,et al. High Capacity Image Steganography Technique based on LSB Substitution Method , 2016 .
[24] Emil Simion,et al. Steganography techniques , 2017, IACR Cryptol. ePrint Arch..
[25] L Sirovich,et al. Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[26] A. W. Wahab,et al. High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution , 2018, Applied Sciences.
[27] Marek R. Ogiela,et al. Multiply information coding and hiding using fuzzy vault , 2019, Soft Comput..
[28] Wojciech Mazurczyk,et al. PadSteg: introducing inter-protocol steganography , 2013, Telecommun. Syst..
[29] George Ghinea,et al. Stego image quality and the reliability of PSNR , 2010, 2010 2nd International Conference on Image Processing Theory, Tools and Applications.
[30] Bill Triggs,et al. Histograms of oriented gradients for human detection , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[31] J. S. Chitode,et al. Least Significant Bit and Discrete Wavelet Transform Algorithm Realization for Image Steganography Employing FPGA , 2016 .
[32] Josephine Sullivan,et al. One millisecond face alignment with an ensemble of regression trees , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[33] M. Pantic,et al. Faces InThe-Wild Challenge : Database and Results , 2016 .
[34] Awad H. Al-Mohy,et al. Improved Inverse Scaling and Squaring Algorithms for the Matrix Logarithm , 2012, SIAM J. Sci. Comput..
[35] Wisam Elmasry,et al. New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check , 2018 .
[36] Shiguang Shan,et al. Learning Euclidean-to-Riemannian Metric for Point-to-Set Classification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.