A New Steganography Algorithm against Chi Square Attack
暂无分享,去创建一个
Rengarajan Amirtharaj | V. Thanikaise | K. Santosh | D. Manikanta | D. Manikanta | R. Amirtharaj | K. Santosh | V. Thanikaise
[1] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[2] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[3] Rengarajan Amirtharaj,et al. Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .
[4] John Bosco Balaguru Rayappan,et al. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .
[5] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[6] Zarinah Mohd Kasirun,et al. Hiding Data in Video File: An Overview , 2010 .
[7] Rengarajan Amirtharaj,et al. Stego on 2n:1 Platform for Users and Embedding , 2011 .
[8] Jiaohua Qin,et al. Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .
[9] Juan Li,et al. A Huffman Coding Section-based Steganography for AAC Audio , 2011 .
[10] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[11] Rengarajan Amirtharaj,et al. Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .
[12] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[13] Subariah Ibrahim,et al. Adaptive image steganography based on optimal embedding and robust against chi-square attack , 2011 .
[14] K. Thenmozhi,et al. OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .