High Performance Pixel indicator For Colour Image Steganography

[1]  Jiaohua Qin,et al.  Random Image Steganography and Steganalysis: Present Status and Future Directions , 2012 .

[2]  Zarinah Mohd Kasirun,et al.  Hiding Data in Video File: An Overview , 2010 .

[3]  Rengarajan Amirtharaj,et al.  Brownian Motion of Binary, Gray-Binary and Gray Bits in Image for Stego , 2012 .

[4]  Juan Li,et al.  A Huffman Coding Section-based Steganography for AAC Audio , 2011 .

[5]  John Bosco Balaguru Rayappan,et al.  Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego , 2012 .

[6]  Rengarajan Amirtharaj,et al.  Inverted Pattern in Inverted Time Domain for Icon Steganography , 2012 .

[7]  K. Thenmozhi,et al.  Pixel Forefinger for Gray in Color: A Layer by Layer Stego , 2012 .

[8]  Xinpeng Zhang,et al.  Efficient Data Hiding With Plus-Minus One or Two , 2010, IEEE Signal Processing Letters.

[9]  Xingming Sun,et al.  Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection , 2008 .

[10]  Miss Laiha Mat Kiah Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .

[11]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[12]  Zhihua Xia,et al.  Feature Selection for Image Steganalysis using Hybrid Genetic Algorithm , 2009 .

[13]  Rengarajan Amirtharaj,et al.  Survey and Analysis of Hardware Cryptographic and Steganographic Systems on FPGA , 2012 .

[14]  Xingming Sun,et al.  Steganography in Ms Excel Document using Text-rotation Technique , 2011 .

[15]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[16]  Tung-Shou Chen,et al.  Blockwise Reversible Data Hiding by Contrast Mapping , 2009 .

[17]  K. Thenmozhi,et al.  Firmware for Data Security: A Review , 2012 .

[18]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[19]  Moayad A. Fadhil,et al.  Arabic Text Steganography using Kashida Extensions with Huffman Code , 2010 .

[20]  Rengarajan Amirtharajan,et al.  An intelligent chaotic embedding approach to enhance stego-image quality , 2012, Inf. Sci..

[21]  Hao Luo,et al.  Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission , 2011 .

[22]  Subariah Ibrahim,et al.  Adaptive image steganography based on optimal embedding and robust against chi-square attack , 2011 .

[23]  Hao Luo,et al.  Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification , 2012 .

[24]  Zarinah Mohd Kasirun,et al.  On the capacity and security of steganography approaches: An overview , 2010 .

[25]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[26]  Zhihua Xia,et al.  Steganalysis Based on Difference Statistics for LSB Matching Steganography , 2009 .

[27]  Xingming Sun,et al.  A Secure Steganographic Method via Multiple Choice Questions , 2011 .

[28]  Azizah Abdul Manaf,et al.  High watermarking capacity based on spatial domain technique , 2011 .

[29]  Jiaohua Qin,et al.  A Review on Detection of LSB Matching Steganography , 2010 .

[30]  Xingming Sun,et al.  An Excellent Image Data Hiding Algorithm Based on BTC , 2011 .

[31]  K. Thenmozhi,et al.  OFDM+CDMA+Stego = Secure Communication: A Review , 2012 .

[32]  Walter Bender,et al.  Applications for data hiding , 2000, IBM Syst. J..

[33]  Hamid A. Jalab,et al.  An Overview on Hiding Information Technique in Images , 2010 .

[34]  Rengarajan Amirtharaj,et al.  Stego on 2n:1 Platform for Users and Embedding , 2011 .

[35]  Yong Zhang,et al.  A Blind Image Watermarking Scheme Using Fast Hadamard Transform , 2010 .