A new transform domain steganography based on modified logistic chaotic map for color images
暂无分享,去创建一个
[1] Sanaa Ghouzali,et al. Chaos based Zero-steganography algorithm , 2013, Multimedia Tools and Applications.
[2] Ying Zeng,et al. Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple Least-Significant Bits Steganography , 2013, IEEE Transactions on Information Forensics and Security.
[3] Mohammad Shahram Moin,et al. A novel image steganography scheme based on morphological associative memory and permutation schema , 2015, Secur. Commun. Networks.
[4] Rose Qingyang Hu,et al. Optimal multiuser spread-spectrum data hiding in digital images , 2015, Secur. Commun. Networks.
[5] S. Hemalatha,et al. A Secure Color Image Steganography In Transform Domain , 2013, ArXiv.
[6] Gandharba Swain,et al. A Novel Approach to RGB Channel Based Image Steganography Technique , 2012, Int. Arab. J. e Technol..
[7] Abid Yahya,et al. Secured and robust information hiding scheme , 2013 .
[8] Zahid Anwar,et al. A survey on reversible watermarking techniques for relational databases , 2015, Secur. Commun. Networks.
[9] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[10] Ju H. Park,et al. Exponential synchronization for fractional-order chaotic systems with mixed uncertainties , 2015, Complex..
[11] Jeong-A Lee,et al. Adaptive least significant bit matching revisited with the help of error images , 2015, Secur. Commun. Networks.
[12] Long Huang,et al. Parameters estimation, mixed synchronization, and antisynchronization in chaotic systems , 2014, Complex..
[13] Ming Li,et al. Extracting Spread-Spectrum Hidden Data From Digital Media , 2013, IEEE Transactions on Information Forensics and Security.
[14] A. Kanso,et al. Steganographic algorithm based on a chaotic map , 2012 .
[15] Ali Kanso,et al. A robust chaotic algorithm for digital image steganography , 2014, Commun. Nonlinear Sci. Numer. Simul..
[16] Pachiyappan Arulmozhivarman,et al. RAND - STEG: an integer wavelet transform domain digital image random steganography using knight's tour , 2015, Secur. Commun. Networks.
[17] Hala S. Own,et al. A blind chaos-based watermarking technique , 2014, Secur. Commun. Networks.
[18] Ki-Hyun Jung,et al. Steganographic method based on interpolation and LSB substitution of digital images , 2014, Multimedia Tools and Applications.
[19] Iqtadar Hussain,et al. A technique for digital steganography using chaotic maps , 2014 .
[20] Der-Chyuan Lou,et al. LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis , 2012, Inf. Sci..
[21] Xinpeng Zhang,et al. Digital image steganalysis based on local textural features and double dimensionality reduction , 2016, Secur. Commun. Networks.
[22] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[23] Ankur Saxena,et al. DCT/DST-Based Transform Coding for Intra Prediction in Image/Video Coding , 2013, IEEE Transactions on Image Processing.
[24] Putra Sumari,et al. Steganography in digital images: Common approaches and tools , 2013 .
[25] Pei-Ling Chiu,et al. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints , 2013, IEEE Transactions on Image Processing.
[26] K. R. Venugopal,et al. Robust image adaptive steganography using integer wavelets , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[27] Nasrin M. Makbol,et al. Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition , 2013 .
[28] Gautam Sanyal,et al. A Robust Image Steganography using DWT Difference Modulation (DWTDM) , 2012 .
[29] Zhihua Xia,et al. Steganalysis of least significant bit matching using multi-order differences , 2014, Secur. Commun. Networks.
[30] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[31] Ralph R. Martin,et al. Structure Aware Visual Cryptography , 2014, Comput. Graph. Forum.
[32] Jessica J. Fridrich,et al. Universal distortion function for steganography in an arbitrary domain , 2014, EURASIP Journal on Information Security.
[33] Chin-Chen Chang,et al. Reversible data hiding exploiting high-correlation regulation for high-quality images , 2015, Secur. Commun. Networks.
[34] Swaminathan Ramakrishnan,et al. Discrete Wavelet Transform and Singular Value Decomposition Based ECG Steganography for Secured Patient Information Transmission , 2014, Journal of Medical Systems.
[35] Chin-Chen Chang,et al. Reversible data hiding for high quality images exploiting interpolation and direction order mechanism , 2013, Digit. Signal Process..
[36] Mohammad Mehdi Rashidi,et al. Increasing image compression rate using steganography , 2013, Expert Syst. Appl..