Software and hardware-based audio-video crypto steganalysis model for enhancing robustness and imperceptibility of secured data
暂无分享,去创建一个
[1] Ching-Nung Yang,et al. Hybrid Data Hiding Based on AMBTC Using Enhanced Hamming Code , 2020, Applied Sciences.
[2] P. V. Powar,et al. Implementation of Digital Video Watermarking Scheme Based on FPGA , 2020 .
[3] Ching-Nung Yang,et al. High-Capacity Data Hiding for ABTC-EQ Based Compressed Image , 2020, Electronics.
[4] S. K. Moon,et al. Hardware-based application of data security system using general modified secured diamond encoding embedding approach for enhancing imperceptibility and authentication , 2019, Multimedia Tools and Applications.
[5] Sa'ed Abed,et al. An Automated Security Approach of Video Steganography-Based LSB Using FPGA Implementation , 2019, J. Circuits Syst. Comput..
[6] Mukesh Dalal,et al. A robust and imperceptible steganography technique for SD and HD videos , 2019, Multimedia Tools and Applications.
[7] Sunil K. Moon,et al. Innovative data security model using forensic audio video steganography for improving hidden data security and robustness , 2018, Int. J. Inf. Comput. Secur..
[8] Mamta Juneja,et al. A robust and imperceptible steganography technique for SD and HD videos , 2018, Multimedia Tools and Applications.
[9] Cheng-Yuan Chang,et al. Embedded FPGA Design for Optimal Pixel Adjustment Process of Image Steganography , 2018 .
[10] Safey A. S. Abdelwahab,et al. FPGA implementation of image steganography algorithms using generalized exploiting modification direction and pixel segmentation strategy , 2018, 2018 35th National Radio Science Conference (NRSC).
[11] Sanket N Shettar,et al. Implementation of Image Steganography using LabVIEW , 2017 .
[12] Kulbir Singh,et al. Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform , 2017, J. Inf. Process. Syst..
[13] B. B. Gupta,et al. A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.
[14] Md. Mokammel Haque,et al. An improved steganographic technique based on diamond encoding method , 2017, 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE).
[15] Ramadhan J. Mstafa,et al. Compressed and raw video steganography techniques: a comprehensive survey and analysis , 2017, Multimedia Tools and Applications.
[16] B. B. Gupta,et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.
[17] Amit Kumar,et al. Implementation of advanced steganography with higher security using LabVIEW , 2016, CSI Transactions on ICT.
[18] Samer H. Atawneh,et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2016, Multimedia Tools and Applications.
[19] E. A. El-shazly,et al. FPGA Implementation of Robust Image Steganography Technique based on Least Significant Bit (LSB) in Spatial Domain , 2016 .
[20] Athanasios V. Vasilakos,et al. A comparative study of steganography designs based on multiple FPGA platforms , 2016, Int. J. Electron. Secur. Digit. Forensics.
[21] Ching-Nung Yang,et al. Lossless data hiding for absolute moment block truncation coding using histogram modification , 2016, Journal of Real-Time Image Processing.
[22] Shahidan M. Abdullah,et al. A robust video watermarking technique for the tamper detection of surveillance systems , 2016, Multimedia Tools and Applications.
[23] Sunil K. Moon,et al. Efficient performance analysis of data hiding technique for enhancement of information security, robustness and perceptibility , 2015, Int. J. Electron. Secur. Digit. Forensics.
[24] A. Ravi Sankar,et al. FPGA implementation of data hididng in grayscale imagesusing neighbour mean interpolation , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[25] Wen-Chung Kuo,et al. A Formula Diamond Encoding Data Hiding Scheme , 2015, J. Inf. Hiding Multim. Signal Process..
[26] Nenghai Yu,et al. Defining embedding distortion for motion vector-based video steganography , 2015, Multimedia Tools and Applications.
[27] Amal Said Khalifa,et al. Video steganography: a comprehensive review , 2015, Multimedia Tools and Applications.
[28] Vijay H. Mankar,et al. Current status and key issues in image steganography: A survey , 2014, Comput. Sci. Rev..
[29] Mohammad Riyas,et al. Hardware Implementation of a Digital Watermarking System Using 3d Dct , 2014 .
[30] Sunil K. Moon,et al. Analysis of secured video steganography using computer forensics technique for enhance data security , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[31] Lilian Bossuet,et al. Architectures of flexible symmetric key crypto engines—a survey: From hardware coprocessor to multi-crypto-processor system on chip , 2013, CSUR.
[32] Jessica J. Fridrich,et al. Digital image steganography using universal distortion , 2013, IH&MMSec '13.
[33] V. Vijayalakshmi,et al. Color Image Steganography based on Pixel Value Modification Method Using Modulus Function , 2013 .
[34] L. H. Ho,et al. Adaptive local complexity controlled data hiding method considering the human visual sensitivity , 2012 .
[35] B. J. Mohd,et al. FPGA hardware of the LSB steganography method , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[36] Tung-Shou Chen,et al. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching , 2012, IEEE Transactions on Information Forensics and Security.
[37] K. Thenmozhi,et al. Hide and seek in silicon - Performance analysis of Quad block Equisum Hardware Steganographic systems , 2012 .
[38] Claudia Feregrino Uribe,et al. On the Implementation of a Hardware Architecture for an Audio Data Hiding System , 2011, J. Signal Process. Syst..
[39] Cheng-Hsing Yang,et al. Anti-Forensics with Steganographic Data Embedding in Digital Images , 2011, IEEE Journal on Selected Areas in Communications.
[40] Jessica J. Fridrich,et al. Design of adaptive steganographic schemes for digital images , 2011, Electronic Imaging.
[41] Ahmed H. Madian,et al. Hardware realization of DC embedding video watermarking technique based on FPGA , 2010, 2010 International Conference on Microelectronics.
[42] Tomás Pevný,et al. Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.
[43] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[44] Tomás Pevný,et al. Modern steganalysis can detect YASS , 2010, Electronic Imaging.
[45] Jason Helge Anderson,et al. A PUF design for secure FPGA-based embedded systems , 2010, 2010 15th Asia and South Pacific Design Automation Conference (ASP-DAC).
[46] Yen-Ping Chu,et al. A Novel Image Data Hiding Scheme with Diamond Encoding , 2009, EURASIP J. Inf. Secur..
[47] Jong-Nam Kim,et al. FPGA based implementation of real-time watermarking for high definition video , 2009, 2009 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS).
[48] A. A. Zaidan,et al. "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[49] B. B. Zaidan,et al. Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[50] Fazida Othman,et al. Stego-Image vs Stego-Analysis System , 2009 .
[51] Bilal Zaidan,et al. Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.
[52] Sanjay N. Talbar,et al. FPGA Implementation of Image Adaptive Watermarking Using Human Visual Model , 2009 .
[53] Jürgen Teich,et al. Power Signature Watermarking of IP Cores for FPGAs , 2008, J. Signal Process. Syst..
[54] Lee-Ming Cheng,et al. Hardware Realization of Steganographic Techniques , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[55] Jonathan Rose,et al. Measuring the Gap Between FPGAs and ASICs , 2006, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[56] Xinpeng Zhang,et al. Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.
[57] Kevin Curran,et al. An evaluation of image based steganography methods , 2006, Multimedia Tools and Applications.
[58] M. Saeb,et al. Design and implementation of a secret key steganographic micro-architecture employing FPGA , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.
[59] Gang Qu,et al. Zero overhead watermarking technique for FPGA designs , 2003, GLSVLSI '03.