A Steganography Embedding Method Based on Hamming Coding and Histogram-Preserving
暂无分享,去创建一个
Jie Cheng | Ya-Feng Li | Ren-Er Yang | Hong-Zhu Dai | Jie Cheng | Hong-Zhu Dai | Yafeng Li | Rener Yang
[1] Shuliang Sun. Image steganography based on hamming code and edge detection , 2018, Int. Arab J. Inf. Technol..
[2] Shyamal Kumar Mondal,et al. Partial reversible data hiding scheme using (7, 4) hamming code , 2017, Multimedia Tools and Applications.
[3] Javaid A. Sheikh,et al. Information hiding in edges: A high capacity information hiding technique using hybrid edge detection , 2016, Multimedia Tools and Applications.
[4] Jessica J. Fridrich,et al. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.
[5] Ching-Nung Yang,et al. A (2, 2) Secret Sharing Scheme Based on Hamming Code and AMBTC , 2012, ACIIDS.
[6] Jessica J. Fridrich,et al. Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..
[7] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[8] Wenxiu Ma,et al. Nonlinear integrable couplings of a generalized super Ablowitz‐Kaup‐Newell‐Segur hierarchy and its super bi‐Hamiltonian structures , 2017, 1706.05234.
[9] Xinpeng Zhang,et al. Efficient data hiding with histogram-preserving property , 2012, Telecommun. Syst..
[10] Ning Zhang,et al. A Riemann-Hilbert Approach to the Chen-Lee-Liu Equation on the Half Line , 2018, Acta Mathematicae Applicatae Sinica, English Series.
[11] Liangmin Wang,et al. High capacity data hiding scheme based on (7, 4) Hamming code , 2016, SpringerPlus.
[12] Ching-Nung Yang,et al. Improving capacity of Hamming (n, k)+1 stego-code by using optimized Hamming + k , 2018, Digit. Signal Process..
[13] Dongkyoo Shin,et al. Data Hiding in a Halftone Image Using Hamming Code (15, 11) , 2011, ACIIDS.
[14] Weiming Zhang,et al. Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.
[15] Chin-Chen Chang,et al. A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images , 2008, 2008 International Symposium on Electronic Commerce and Security.
[16] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[17] Weiping Zhang,et al. Fuzzy theoretic approach to signals and systems: Static systems , 2017, Inf. Sci..
[18] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[19] Shuliang Sun,et al. A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..
[20] Andreas Westfeld,et al. F5-A Steganographic Algorithm , 2001, Information Hiding.
[21] Ainuddin Wahid Abdul Wahab,et al. Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..
[22] Jessica J. Fridrich,et al. Practical steganalysis of digital images: state of the art , 2002, IS&T/SPIE Electronic Imaging.