Secure data hiding by fruit fly optimization improved hybridized seeker algorithm
暂无分享,去创建一个
[1] A. W. Wahab,et al. High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution , 2018, Applied Sciences.
[2] Thomas Stützle,et al. Frankenstein's PSO: A Composite Particle Swarm Optimization Algorithm , 2009, IEEE Transactions on Evolutionary Computation.
[3] Sakir Sezer,et al. Spatio-Temporal Rich Model-Based Video Steganalysis on Cross Sections of Motion Vector Planes , 2016, IEEE Transactions on Image Processing.
[4] Ki-Hyun Jung,et al. High-capacity index based data hiding method , 2014, Multimedia Tools and Applications.
[5] S. P. Rajagopalan,et al. A stegano - visual cryptography technique for multimedia security , 2019, Multimedia Tools and Applications.
[6] Özlem Uzuner,et al. Annotating risk factors for heart disease in clinical narratives for diabetic patients , 2015, J. Biomed. Informatics.
[7] Xinpeng Zhang,et al. Separable Reversible Data Hiding in Encrypted Image , 2012, IEEE Transactions on Information Forensics and Security.
[8] Jianjun Wang,et al. A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..
[9] Bin Li,et al. Investigation on Cost Assignment in Spatial Image Steganography , 2014, IEEE Transactions on Information Forensics and Security.
[10] Bin Li,et al. A Strategy of Clustering Modification Directions in Spatial Image Steganography , 2015, IEEE Transactions on Information Forensics and Security.
[11] R. Haff,et al. Detection of Fruit-fly Infestation in Olives using X-Ray Imaging: Algorithm Development and Prospects , 2016 .
[12] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[13] Amod Kumar,et al. A Secure and High-Capacity Data-Hiding Method Using Compression, Encryption and Optimized Pixel Value Differencing , 2018, IEEE Access.
[14] Karim Faez,et al. Adaptive image steganography based on transform domain via genetic algorithm , 2017 .
[15] F. Pezzella,et al. A genetic algorithm for the Flexible Job-shop Scheduling Problem , 2008, Comput. Oper. Res..
[16] Tamma Bheemarjuna Reddy,et al. On improving SINR in LTE HetNets with D2D relays , 2016, Comput. Commun..
[17] Ahmed Al-Ani,et al. A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..
[18] Punam Bedi,et al. Using PSO in a spatial domain based image hiding scheme with distortion tolerance , 2013, Comput. Electr. Eng..
[19] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[20] Chiang-Lung Liu,et al. High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..
[21] Warley Gramacho Da Silva,et al. Optimizing Image Steganography using Particle Swarm Optimization Algorithm , 2017 .
[22] Lisheng Xu,et al. A High Capacity Spatial Domain Data Hiding Scheme for Medical Images , 2017, J. Signal Process. Syst..
[23] Sung Wook Baik,et al. Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..
[24] Inan Güler,et al. A novel fuzzy logic-based image steganography method to ensure medical data security , 2015, Comput. Biol. Medicine.
[25] Chaohua Dai,et al. Seeker Optimization Algorithm for Optimal Reactive Power Dispatch , 2009, IEEE Transactions on Power Systems.
[26] Ahmad Hamad,et al. Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..
[27] Wen Gao,et al. SSIM based perceptual distortion rate optimization coding , 2010, Visual Communications and Image Processing.
[28] Alan C. Bovik,et al. Mean squared error: Love it or leave it? A new look at Signal Fidelity Measures , 2009, IEEE Signal Processing Magazine.
[29] Te-Ming Tu,et al. A Novel Image Steganographic Method Using Tri-way Pixel-Value Differencing , 2008, J. Multim..
[30] Ambika,et al. Secure medical image steganography through optimal pixel selection by EH-MB pipelined optimization technique , 2020, Health and Technology.
[31] Ja-Chen Lin,et al. Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..
[32] Khan Muhammad,et al. CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.
[33] Xiaoyun Wang,et al. High capacity data hiding based on interpolated image , 2016, Multimedia Tools and Applications.
[34] Daniel R. Jeske,et al. Mean Squared Error of Estimation or Prediction under a General Linear Model , 1992 .
[35] Devesh Kumar Srivastava,et al. Comprehensive Data Hiding Technique for Discrete Wavelet Transform-Based Image Steganography Using Advance Encryption Standard , 2017 .
[36] Michel C. Jeruchim,et al. Techniques for Estimating the Bit Error Rate in the Simulation of Digital Communication Systems , 1984, IEEE J. Sel. Areas Commun..
[37] Chaohua Dai,et al. Seeker Optimization Algorithm for Digital IIR Filter Design , 2010, IEEE Transactions on Industrial Electronics.
[38] Sheila S. Hemami,et al. VSNR: A Wavelet-Based Visual Signal-to-Noise Ratio for Natural Images , 2007, IEEE Transactions on Image Processing.
[39] Harsh K. Verma,et al. A high capacity text steganography scheme based on LZW compression and color coding , 2017 .
[40] Anan Banharnsakun,et al. Artificial bee colony approach for enhancing LSB based image steganography , 2018, Multimedia Tools and Applications.