Performance evaluation of encryption algorithm using fruit fly optimization improved hybridized seeker and PVD algorithm
暂无分享,去创建一个
[1] T. Sree Sharmila,et al. Efficient analysis of hybrid directional lifting technique for satellite image denoising , 2014, Signal Image Video Process..
[2] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[3] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[4] T. S. R. Raja,et al. Impact of applying pre-processing techniques for improving classification accuracy , 2014, Signal Image Video Process..
[5] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[6] FridrichJessica,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001 .
[7] T. Sree Sharmila,et al. Performance analysis in secured image encryption and data hiding using LSB algorithm , 2017, 2017 IEEE International Conference on Circuits and Systems (ICCS).
[8] T. Sree Sharmila,et al. Secure data hiding by fruit fly optimization improved hybridized seeker algorithm , 2020 .
[9] Fayed F. M. Ghaleb,et al. Optimized video steganography using Cuckoo Search algorithm , 2015, 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS).
[10] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[11] T. Sree Sharmila,et al. Comparative Analysis of satellite Image pre-Processing Techniques , 2013, J. Comput. Sci..
[12] Jamshid Shanbehzadeh,et al. High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .
[13] T. Sree Sharmila,et al. Hiding Data in Videos Using Optimal Selection of Key-Frames , 2018, 2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP).
[14] Sree Sharmila Thangaswamy,et al. Developing an efficient technique for satellite image denoising and resolution enhancement for improving classification accuracy , 2013 .
[15] Andrew Lewis,et al. The Whale Optimization Algorithm , 2016, Adv. Eng. Softw..
[16] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[17] Punam Bedi,et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..
[18] Warley Gramacho Da Silva,et al. Optimizing Image Steganography using Particle Swarm Optimization Algorithm , 2017 .
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] R. Haff,et al. Detection of Fruit-fly Infestation in Olives using X-Ray Imaging: Algorithm Development and Prospects , 2016 .
[21] Xin-She Yang,et al. Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).
[22] Yongquan Zhou,et al. A Novel Cuckoo Search Optimization Algorithm Base on Gauss Distribution , 2012 .
[23] Robert Cousins,et al. Clarification of the use of CHI-square and likelihood functions in fits to histograms , 1984 .
[24] Hamidreza Rashidy Kanan,et al. A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..
[25] Warley Gramacho,et al. Optimizing Image Steganography using Particle Swarm Optimization Algorithm , 2017 .
[26] Chaohua Dai,et al. Seeker Optimization Algorithm for Optimal Reactive Power Dispatch , 2009, IEEE Transactions on Power Systems.
[27] Andrew Lewis,et al. Grey Wolf Optimizer , 2014, Adv. Eng. Softw..