Authentication of secret information in image Steganography
暂无分享,去创建一个
K.R. Venugopal | L.M. Patnaik | K.B. Raja | T. H. Manjula Devi | K.S. Babu | K.K. Kiran | T.H. Manjula Devi | K. Venugopal | L. Patnaik | K. Raja | K. Babu | K. Kiran
[1] B. S. Manjunath,et al. Detection of hiding in the least significant bit , 2004, IEEE Transactions on Signal Processing.
[2] Ying Wang,et al. Steganalysis of block-DCT image steganography , 2003, IEEE Workshop on Statistical Signal Processing, 2003.
[3] Andrew H. Sung,et al. Defeating the current steganalysis techniques (robust steganography) , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[4] Alex ChiChung Kot,et al. Steganalysis of data hiding in binary text images , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[5] E. Chang,et al. Grey level modification steganography for secret communication , 2004, 2nd IEEE International Conference on Industrial Informatics, 2004. INDIN '04. 2004.
[6] Lisa M. Marvel,et al. Hiding information in images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[7] Zheng Zhang,et al. Detection of block DCT-based steganography in gray-scale images , 2002, 2002 IEEE Workshop on Multimedia Signal Processing..
[8] Jiri Fridrich,et al. Steganalysis of LSB encoding in color images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[9] Giuseppe Mastronardi,et al. Steganography effects in various formats of images. A preliminary study , 2001, Proceedings of the International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IDAACS'2001 (Cat. No.01EX510).
[10] Chin-Chen Chang,et al. An effective image steganographic scheme based on wavelet transformation and pattern-based modification , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..
[11] Z. Qiu,et al. A DWT-based color image steganography scheme , 2002, 6th International Conference on Signal Processing, 2002..
[12] Li Zhi,et al. Detection of random LSB image steganography , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[13] Wen Gao,et al. Steganalysis of data hiding techniques in wavelet domain , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[14] Rajarathnam Chandramouli. Web search steganalysis: some challenges and approaches , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[15] A.I. Hashad,et al. A robust steganography technique using discrete cosine transform insertion , 2005, 2005 International Conference on Information and Communication Technology.
[16] Sushil Jajodia,et al. Steganalysis: the investigation of hidden information , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[17] Andrew D. Ker. Steganalysis of LSB matching in grayscale images , 2005, IEEE Signal Processing Letters.
[18] Kazuhiko Yamaguchi,et al. Integrity Verification of Secret Information in Image Steganography , 2006 .
[19] Rajarathnam Chandramouli. On information hiding with incomplete information about steganalysis , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..