An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
暂无分享,去创建一个
Mazdak Zamani | Rohit Tanwar | Amit Verma | Prashant Kumar | Kulvinder Singh | Rohit Tanwar | Amit Verma | M. Zamani | Kulvinder Singh | Prashant Kumar
[1] Akram M. Zeki,et al. PSW statistical LSB image steganalysis , 2016, Multimedia Tools and Applications.
[2] Akram M. Zeki,et al. Robust audio steganography via genetic algorithm , 2009, 2009 International Conference on Information and Communication Technologies.
[3] Mazdak Zamani,et al. Pixel Correlation Behavior in Different Themes , 2013, GRMSE.
[4] Hossein Rouhani Zeidanloo,et al. Genetic Audio Watermarking , 2010, BAIP.
[5] Farnaz Arab,et al. A robust video watermarking using simulated block based spatial domain technique , 2014 .
[6] Akram M. Zeki,et al. A secure audio steganography approach , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).
[7] Shuo-Tsung Chen,et al. Optimization-based audio watermarking with integrated quantization embedding , 2015, Multimedia Tools and Applications.
[8] M. Zamani,et al. An Introduction to Image Steganography Techniques , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[9] Rob Nadolski,et al. Field assessment of serious games for entrepreneurship in higher education , 2013 .
[10] Azizah Bt Abdul Manaf,et al. Azizah technique for efficiency measurement in steganography , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).
[11] Mazdak Zamani,et al. Determining the threshold of pixel correlativity analysis , 2013 .
[12] Shraddha Bhise,et al. Review of Digital Watermarking Techniques , 2015 .
[13] Subariah Ibrahim,et al. A New Method for Audio Steganography Using Message Integrity , 2013 .
[14] Akram M. Zeki,et al. Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography , 2009, IEEE Games Entertainment Media Conference.
[15] Hossein Rouhani Zeidanloo,et al. Genetic substitution-based audio steganography for high capacity applications , 2011 .
[16] Siti Zaiton Mohd Hashim,et al. A robust video watermarking technique for the tamper detection of surveillance systems , 2015, Multimedia Tools and Applications.
[17] Mazdak Zamani,et al. Capacity and quality improvement in reversible image watermarking approach , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[18] Mazdak Zamani,et al. Statistical Steganalysis of Four Photo Themes before Embedding , 2013, 2013 International Conference on Advanced Computer Science Applications and Technologies.
[19] Mazdak Zamani,et al. Correlation Analysis of the Four Photo Themes in Five Layers , 2013, GRMSE.
[20] Ying Liu,et al. Building Lightweight Network-based Capabilities in Network with Locator/Identifier Separation , 2013 .
[21] Akram M. Zeki,et al. A Genetic-Algorithm-Based Approach for Audio Steganography , 2009 .
[22] Akram M. Zeki,et al. An approach to improve the robustness of substitution techniques of audio steganography , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[23] Mazdak Zamani,et al. Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques , 2010 .
[24] Mazdak Zamani,et al. VW16E: A Robust Video Watermarking Technique Using Simulated Blocks , 2017 .
[25] Abid Yahya,et al. Introduction to Steganography , 2018, Steganography Techniques for Digital Images.
[26] Akram M. Zeki,et al. A Novel Approach for Audio Watermarking , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[27] Akram M. Zeki,et al. A robust watermark embedding in smooth areas , 2011 .
[28] Daiyuan Peng,et al. A Formal Analysis Method for Optimistic Fair Exchange Protocol , 2013 .
[29] Wang Yuhong,et al. A Suitable Adaptive Illumination Compensation Method for Face Detection , 2013 .
[30] Mazdak Zamani,et al. Current problems of substitution techniques of audio steganography , 2009 .
[31] Ee-Leng Tan,et al. Optimal and secure audio watermarking scheme based on self-adaptive particle swarm optimization and quaternion wavelet transform , 2015, Signal Process..
[32] Xin Yao,et al. SNR-Constrained Heuristics for Optimizing the Scaling Parameter of Robust Audio Watermarking , 2018, IEEE Transactions on Multimedia.
[33] Hossein Rouhani Zeidanloo,et al. Genetic Audio Steganography Azizah , 2010 .
[34] Yang Xiaofeng,et al. Human Capital Distribution Structure, Inequality and Growth Momentum , 2013 .
[35] Mazdak Zamani,et al. An overview on audio steganography techniques , 2012 .
[36] Mazdak Zamani,et al. Knots of substitution techniques of audio steganography , 2009 .
[37] Hossein Rouhani Zeidanloo,et al. A Novel Approach for Genetic Audio Watermarking , 2010 .
[38] Shahidan M. Abdullah,et al. Mazdak Technique for PSNR Estimation in Audio Steganography , 2012 .
[39] Mazdak Zamani,et al. Genetic algorithm for fragile audio watermarking , 2014, Telecommunication Systems.
[40] Mazdak Zamani,et al. Correlation between PSNR and size ratio in audio steganography , 2012 .
[41] Akram M. Zeki,et al. An artificial-intelligence-based approach for audio steganography , 2009 .
[42] Mazdak Zamani,et al. A Survey on Digital Image Watermarking Techniques in Spatial and Transform Domains , 2015 .
[43] ALAA A. JABBAR AL-TAAY,et al. Multimedia Data Hiding Evaluation Metrics , 2012 .