An OMP Steganographic Algorithm Optimized by SFLA
暂无分享,去创建一个
[1] Pachiyappan Arulmozhivarman,et al. High security image steganography using IWT and graph theory , 2013, 2013 IEEE International Conference on Signal and Image Processing Applications.
[2] Chin-Chen Chang,et al. Second-order steganographic method based on adaptive reference matrix , 2015, IET Image Process..
[3] Toby Sharp,et al. An Implementation of Key-Based Digital Signal Steganography , 2001, Information Hiding.
[4] Tomás Pevný,et al. "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.
[5] Shahrokh Ghaemmaghami,et al. Colour image steganography method based on sparse representation , 2015, IET Image Process..
[6] Li-Hua Gong,et al. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing , 2014 .
[7] Saeed R. Khosravirad,et al. Closure of sets: A statistically hypersensitive system for steganalysis of least significant bit embedding , 2011 .
[8] Tomás Pevný,et al. Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..
[9] Wang Liang-jun,et al. Advances in Theory and Application of Compressed Sensing , 2009 .
[10] Mauro Barni,et al. MPSteg-color: A New Steganographic Technique for Color Images , 2007, Information Hiding.
[11] Yun Q. Shi,et al. Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[12] Kevin E Lansey,et al. Optimization of Water Distribution Network Design Using the Shuffled Frog Leaping Algorithm , 2003 .
[13] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[14] Xinxin Niu,et al. Non-uniform Quantization in Breaking HUGO , 2013, IWDW.
[15] Mauro Barni,et al. MPSteg-Color: Data Hiding Through Redundant Basis Decomposition , 2009, IEEE Transactions on Information Forensics and Security.
[16] Chin-Chen Chang,et al. A multi-threshold secret image sharing scheme based on MSP , 2012, Pattern Recognit. Lett..
[17] Jignesh N. Sarvaiya,et al. Image reconstruction using Orthogonal Matching Pursuit (OMP) algorithm , 2014, 2014 2nd International Conference on Emerging Technology Trends in Electronics, Communication and Networking.
[18] Florent Retraint,et al. Statistical Model of Quantized DCT Coefficients: Application in the Steganalysis of Jsteg Algorithm , 2014, IEEE Transactions on Image Processing.
[19] Ja-Chen Lin,et al. Reversible JPEG-Based Hiding Method with High Hiding-Ratio , 2010, Int. J. Pattern Recognit. Artif. Intell..
[20] Xuezeng Pan,et al. A lossless robust data hiding scheme , 2010, Pattern Recognit..
[21] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[22] Li Zhang,et al. Supervised locally linear embedding algorithm based on orthogonal matching pursuit , 2015, IET Image Process..
[23] Jun Yu,et al. Capacity Limits of Pseudorandom Channels in Deception Problems , 2015, IEEE Transactions on Information Forensics and Security.
[24] Kuo-Chen Wu,et al. Steganography Using Reversible Texture Synthesis , 2015, IEEE Transactions on Image Processing.