Steganographic approach to enhancing secure data communication using contours and clustering
暂无分享,去创建一个
G. Manikandan | A. Srinivasan | N. R. Raajan | N. R. Raajan | D. Narasimhan | R. Bala Krishnan | N. Rajesh Kumar | G. Manikandan | D. Narasimhan | A. Srinivasan | N. Rajesh Kumar | R. Bala Krishnan
[1] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[2] Simying Ong,et al. An enhanced mechanism for image steganography using sequential colour cycle algorithm , 2013, Int. Arab J. Inf. Technol..
[3] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[4] Wen-Hsiang Tsai,et al. A steganographic method for images by pixel-value differencing , 2003, Pattern Recognit. Lett..
[5] Hamed Modaghegh,et al. A new fast and efficient active steganalysis based on combined geometrical blind source separation , 2014, Multimedia Tools and Applications.
[6] Manpreet Kaur,et al. ADCT-based Robust Methodology for Image Steganography , 2013 .
[7] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[8] S. Ramakrishnan,et al. An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image , 2014, Int. J. Netw. Secur..
[9] G. Manikandan,et al. A N-QUEEN BASED POLYNOMIAL APPROACH FOR IMAGE STEGANOGRAPHY , 2013 .
[10] Tao Zhang,et al. A novel blind detector for additive noise steganography in JPEG decompressed images , 2012, Multimedia Tools and Applications.
[11] Yih-Kai Lin,et al. High capacity reversible data hiding scheme based upon discrete cosine transformation , 2012, J. Syst. Softw..
[12] Qiaoyan Wen,et al. A steganographic method for digital images with four-pixel differencing and modified LSB substitution , 2011, J. Vis. Commun. Image Represent..
[13] Jagannathan Chakravarthy,et al. An enhanced Hill cipher approach for image encryption in steganography , 2013, Int. J. Electron. Secur. Digit. Forensics.
[14] Cheng-Hsing Yang,et al. Inverted pattern approach to improve image quality of information hiding by LSB substitution , 2008, Pattern Recognit..
[15] Jeong-A Lee,et al. Double phase modular steganography with the help of error images , 2013, Multimedia Tools and Applications.
[16] Cheng-Hsing Yang,et al. Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[17] Rengarajan Amirtharajan,et al. PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography , 2010 .
[18] Gopal K Gupta,et al. Introduction to Data Mining with Case Studies , 2011 .
[19] Guillermo Sapiro,et al. Geodesic Active Contours , 1995, International Journal of Computer Vision.
[20] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[21] R. Suganya,et al. Data Mining Concepts and Techniques , 2010 .
[22] Moazzam Hossain,et al. Variable rate Steganography in gray scale digital images using neighborhood pixel information , 2009, 2009 12th International Conference on Computers and Information Technology.
[23] Shang-Kuan Chen. A module-based LSB substitution method with lossless secret data compression , 2011, Comput. Stand. Interfaces.
[24] Reza Jafari,et al. Efficient steganalysis of images: learning is good for anticipation , 2012, Pattern Analysis and Applications.
[25] Shang-Juh Kao,et al. A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..
[26] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[27] B. Karthikeyan,et al. An efficient arithmetic coding data compression with steganography , 2013, 2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).
[28] Hongjun Liu,et al. Triple-image encryption scheme based on one-time key stream generated by chaos and plain images , 2013, J. Syst. Softw..
[29] Mohey M. Hadhoud,et al. Data hiding based on contrast mapping using DNA medium , 2011, Int. Arab J. Inf. Technol..
[30] Nasser Hamad,et al. Hiding Text Information in a Digital Image Based on Entropy Function , 2010, Int. Arab J. Inf. Technol..
[31] B. Karthikeyan,et al. Amalgamation of Scanning paths and Modified Hill Cipher for Secure Steganography , 2012 .
[32] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[33] Chin-Chen Chang,et al. Reversible hiding in DCT-based compressed images , 2007, Inf. Sci..