High Performance Pixel indicator For Colour Image Steganography
暂无分享,去创建一个
John Bosco Balaguru Rayappan | Rengarajan Amirtharaj | A. Kingsly Infant | K. Mohamed Ashfaaq | J. Rayappan | R. Amirtharaj | A. Infant | K. M. Ashfaaq
[1] Jiaohua Qin,et al. Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .
[2] Zarinah Mohd Kasirun,et al. Hiding Data in Video File: An Overview , 2010 .
[3] Rengarajan Amirtharaj,et al. Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .
[4] Juan Li,et al. A Huffman Coding Section-based Steganography for AAC Audio , 2011 .
[5] John Bosco Balaguru Rayappan,et al. Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .
[6] Rengarajan Amirtharaj,et al. Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .
[7] K. Thenmozhi,et al. Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .
[8] Xinpeng Zhang,et al. Efficient Data Hiding With Plus-Minus One or Two , 2010, IEEE Signal Processing Letters.
[9] Xingming Sun,et al. Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection , 2008 .
[10] Miss Laiha Mat Kiah. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .
[11] Adnan Abdul-Aziz Gutub,et al. Pixel Indicator Technique for RGB Image Steganography , 2010 .
[12] Zhihua Xia,et al. Feature Selection for Image Steganalysis using Hybrid Genetic Algorithm , 2009 .
[13] Rengarajan Amirtharaj,et al. Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .
[14] Xingming Sun,et al. Steganography in Ms Excel Document using Text-rotation Technique , 2011 .
[15] Lee-Ming Cheng,et al. Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..
[16] Tung-Shou Chen,et al. Blockwise Reversible Data Hiding by Contrast Mapping , 2009 .
[17] K. Thenmozhi,et al. Firmware for Data Security: A Review , 2012 .
[18] Kevin Curran,et al. Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..
[19] Moayad A. Fadhil,et al. Arabic Text Steganography using Kashida Extensions with Huffman Code , 2010 .
[20] Rengarajan Amirtharajan,et al. An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..
[21] Hao Luo,et al. Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission , 2011 .
[22] Subariah Ibrahim,et al. Adaptive image steganography based on optimal embedding and robust against chi-square attack , 2011 .
[23] Hao Luo,et al. Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification , 2012 .
[24] Zarinah Mohd Kasirun,et al. On the capacity and security of steganography approaches: An overview , 2010 .
[25] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[26] Zhihua Xia,et al. Steganalysis Based on Difference Statistics for LSB Matching Steganography , 2009 .
[27] Xingming Sun,et al. A Secure Steganographic Method via Multiple Choice Questions , 2011 .
[28] Azizah Abdul Manaf,et al. High watermarking capacity based on spatial domain technique , 2011 .
[29] Jiaohua Qin,et al. A Review on Detection of LSB Matching Steganography , 2010 .
[30] Xingming Sun,et al. An Excellent Image Data Hiding Algorithm Based on BTC , 2011 .
[31] K. Thenmozhi,et al. OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .
[32] Walter Bender,et al. Applications for data hiding , 2000, IBM Syst. J..
[33] Hamid A. Jalab,et al. An Overview on Hiding Information Technique in Images , 2010 .
[34] Rengarajan Amirtharaj,et al. Stego on 2n:1 Platform for Users and Embedding , 2011 .
[35] Yong Zhang,et al. A Blind Image Watermarking Scheme Using Fast Hadamard Transform , 2010 .