Image Steganography Capacity Improvement Using Cohort Intelligence and Modified Multi-Random Start Local Search Methods
暂无分享,去创建一个
[1] Hitoshi Kiya,et al. A Method of Embedding Binary Data into JPEG Bitstreams , 2002, Systems and Computers in Japan.
[2] Chin-Chen Chang,et al. Steganography using JPEG-compressed images , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[3] Ajith Abraham,et al. Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[4] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[5] Anand Jayant Kulkarni,et al. Constrained cohort intelligence using static and dynamic penalty function approach for mechanical components design , 2016, Int. J. Parallel Emergent Distributed Syst..
[6] Rainer Böhme,et al. Principles of Modern Steganography and Steganalysis , 2010 .
[7] John Miano,et al. Compressed image file formats , 1999 .
[8] Nasir D. Memon,et al. Image Steganography and Steganalysis: Concepts and Practice , 2003, IWDW.
[9] Kefa Rabah,et al. Steganography-The Art of Hiding Data , 2004 .
[10] Hojjat Rakhshani,et al. Intelligent Multiple Search Strategy Cuckoo Algorithm for Numerical and Engineering Optimization Problems , 2017 .
[11] Wasan Shaker Awad,et al. Information Hiding Using Ant Colony Optimization Algorithm , 2011, Int. J. Technol. Diffusion.
[12] Rina Mishra,et al. A review on steganography and cryptography , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[13] Nameer N. El-Emam. New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization , 2015, Comput. Secur..
[14] Jamshid Shanbehzadeh,et al. High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .
[15] Swaminathan Ramakrishnan,et al. Imperceptibility - Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization , 2016, Expert Syst. Appl..
[16] Anand Jayant Kulkarni,et al. Solving 0–1 Knapsack Problem using Cohort Intelligence Algorithm , 2016, Int. J. Mach. Learn. Cybern..
[17] Hideki Noda,et al. Application of BPCS steganography to wavelet compressed video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[18] Robert M. Hierons,et al. JPEG Steganography: A Performance Evaluation of Quantization Tables , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[19] John Miano,et al. Compressed image file formats - JPEG, PNG, GIF, XBM, BMP , 1999 .
[20] Muhammad Sher,et al. Secure Digital Steganography for ASCII Text Documents , 2013 .
[21] Ajith Abraham,et al. Ideology algorithm: a socio-inspired optimization methodology , 2017, Neural Computing and Applications.
[22] D. Jude Hemanth,et al. Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems , 2016 .
[23] J.-S. Coron. What Is Cryptography? , 2006, IEEE Secur. Priv..
[24] Anand Jayant Kulkarni,et al. Design of a fractional PIλDμ controller using the cohort intelligence method , 2018, Frontiers of Information Technology & Electronic Engineering.
[25] Yi Shi,et al. Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..
[26] Anand J. Kulkarni,et al. Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems , 2016, Eur. J. Oper. Res..
[27] Shen Wang,et al. A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..
[28] Medha Kulkarni,et al. An information hiding system using 16*16 quantization table , 2015, 2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014).
[29] Weiming Zhang,et al. Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.
[30] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[31] Anand Jayant Kulkarni,et al. Cohort intelligence algorithm for discrete and mixed variable engineering problems , 2018, Int. J. Parallel Emergent Distributed Syst..
[32] Joan L. Mitchell,et al. JPEG: Still Image Data Compression Standard , 1992 .
[33] M. M. Raghuwanshi,et al. Improved Particle Swarm Optimization Based on Natural Flocking Behavior , 2016 .
[34] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[35] Mohamed A. El-Dosuky,et al. Jpeg Image Compression Using Discrete Cosine Transform - A Survey , 2014, ArXiv.
[36] Chin-Chen Chang,et al. Hiding secret data in images via predictive coding , 2005, Pattern Recognit..
[37] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[38] Anand Jayant Kulkarni,et al. Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm , 2018, Neural Computing and Applications.
[39] Anand Jayant Kulkarni,et al. Cohort Intelligence: A Self Supervised Learning Behavior , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[40] Anand Jayant Kulkarni,et al. Variations of cohort intelligence , 2018, Soft Comput..
[41] Yilin Pang,et al. A high capacity steganographic method based on quantization table modification , 2011, Wuhan University Journal of Natural Sciences.
[42] Raveendran Paramesran,et al. A hybrid approach for data clustering based on modified cohort intelligence and K-means , 2014, Expert Syst. Appl..
[43] Chin-Chen Chang,et al. A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..
[44] Rinita Roy,et al. Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-connected PSNR , 2015, KES.
[45] Z. Azimifar,et al. Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).
[46] Huaiqing Wang,et al. Cyber warfare: steganography vs. steganalysis , 2004, CACM.
[47] G. Prema,et al. Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[48] Debnath Bhattacharyya,et al. Image Data Hiding Technique Using Discrete Fourier Transformation , 2011, UCMA.
[49] J. K. Mandal,et al. A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .
[50] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[51] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[52] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[53] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..